πŸ” CVE Alert

CVE-2026-35337

HIGH 8.8

Apache Storm Client: RCE through Unsafe Deserialization via Kerberos TGT Credential Handling

CVSS Score
8.8
EPSS Score
0.3%
EPSS Percentile
54th

Deserialization of Untrusted Data vulnerability in Apache Storm. Versions Affected: before 2.8.6. Description: When processing topology credentials submitted via the Nimbus Thrift API, Storm deserializes the base64-encoded TGT blob using ObjectInputStream.readObject() without any class filtering or validation.Β An authenticated user with topology submission rights could supply a crafted serialized object in the "TGT" credential field, leading to remote code execution in both the Nimbus and Worker JVMs. Mitigation: 2.x users should upgrade to 2.8.6. Users who cannot upgrade immediately should monkey-patch an ObjectInputFilter allow-list to ClientAuthUtils.deserializeKerberosTicket() restricting deserialized classes to javax.security.auth.kerberos.KerberosTicket and its known dependencies. A guide on how to do this is available in the release notes of 2.8.6. Credit: This issue was discovered by K.

CWE CWE-502
Vendor apache software foundation
Product apache storm client
Published Apr 13, 2026
Last Updated Apr 14, 2026
Stay Ahead of the Next One

Get instant alerts for apache software foundation apache storm client

Be the first to know when new high vulnerabilities affecting apache software foundation apache storm client are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

Affected Versions

Apache Software Foundation / Apache Storm Client
0 < 2.8.6

References

NVD β†— CVE.org β†— EPSS Data β†—
storm.apache.org: https://storm.apache.org/2026/04/12/storm286-released.html openwall.com: http://www.openwall.com/lists/oss-security/2026/04/12/6

Credits

K