πŸ” CVE Alert

CVE-2026-33728

UNKNOWN 0.0

dd-trace-java: Unsafe deserialization in RMI instrumentation may lead to remote code execution

CVSS Score
0.0
EPSS Score
0.6%
EPSS Percentile
69th

dd-trace-java is a Datadog APM client for Java. In versions of dd-trace-java 0.40.0 through prior to 1.60.2, the RMI instrumentation registered a custom endpoint that deserialized incoming data without applying serialization filters. On JDK version 16 and earlier, an attacker with network access to a JMX or RMI port on an instrumented JVM could exploit this to potentially achieve remote code execution.Β All three of the following conditions must be true to exploit this vulnerability: First, dd-trace-java is attached as a Java agent (`-javaagent`) on Java 16 or earlier. Second, a JMX/RMI port has been explicitly configured via `-Dcom.sun.management.jmxremote.port` and is network-reachable, Third, a gadget-chain-compatible library is present on the classpath. For JDK >= 17, no action is required, but upgrading is strongly encouraged. For JDK >= 8u121 < JDK 17, upgrade to dd-trace-java version 1.60.3 or later. For JDK < 8u121 and earlier where serialization filters are not available, apply the workaround. The workaround is to set the following environment variable to disable the RMI integration: `DD_INTEGRATION_RMI_ENABLED=false`.

CWE CWE-502
Vendor datadog
Product dd-trace-java
Published Mar 27, 2026
Last Updated Mar 27, 2026
Stay Ahead of the Next One

Get instant alerts for datadog dd-trace-java

Be the first to know when new unknown vulnerabilities affecting datadog dd-trace-java are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

Affected Versions

DataDog / dd-trace-java
>= 0.40.0, < 1.60.3

References

NVD β†— CVE.org β†— EPSS Data β†—
github.com: https://github.com/DataDog/dd-trace-java/security/advisories/GHSA-579q-h82j-r5v2 github.com: https://github.com/DataDog/dd-trace-java/releases/tag/v1.60.3