Apache Helix: Deserialization vulnerability in Helix workflow and REST
Description
An attacker can use SnakeYAML to deserialize java.net.URLClassLoader and make it load a JAR from a specified URL, and then deserialize javax.script.ScriptEngineManager to load code using that ClassLoader. This unbounded deserialization can likely lead to remote code execution. The code can be run in Helix REST start and Workflow creation.
Affect all the versions lower and include 1.2.0.
Affected products: helix-core, helix-rest
Mitigation: Short term, stop using any YAML based configuration and workflow creation. Long term, all Helix version bumping up to 1.3.0
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unbounded SnakeYAML deserialization in Apache Helix allows remote code execution via crafted YAML in REST and workflow creation.
The vulnerability (CVE-2023-38647) stems from Apache Helix's use of the SnakeYAML library for deserializing YAML data. An attacker can craft a malicious YAML payload that triggers deserialization of java.net.URLClassLoader and javax.script.ScriptEngineManager, enabling the loading of arbitrary code from a remote JAR. This unbounded deserialization can lead to remote code execution (RCE) [1].
Exploitation requires the attacker to supply the malicious YAML to Helix REST endpoints or during workflow creation. The attack surface includes the helix-rest and helix-core components. No authentication is explicitly mentioned, implying that an attacker with network access to these services could exploit the flaw [1].
Successful exploitation results in full remote code execution on the affected Helix server, potentially compromising the entire cluster's management plane and data [1].
As a short-term mitigation, users should stop using YAML-based configuration and workflow creation. For a permanent fix, upgrade to Helix version 1.3.0, which bumps SnakeYAML to version 2.0, addressing the deserialization issue [2][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.helix:helix-coreMaven | < 1.3.0 | 1.3.0 |
org.apache.helix:helix-restMaven | < 1.3.0 | 1.3.0 |
Affected products
137- osv-coords136 versionspkg:apk/chainguard/trinopkg:apk/chainguard/trino-configpkg:apk/chainguard/trino-oci-entrypointpkg:apk/chainguard/trino-plugin-accumulopkg:apk/chainguard/trino-plugin-ai-functionspkg:apk/chainguard/trino-plugin-atoppkg:apk/chainguard/trino-plugin-bigquerypkg:apk/chainguard/trino-plugin-blackholepkg:apk/chainguard/trino-plugin-cassandrapkg:apk/chainguard/trino-plugin-clickhousepkg:apk/chainguard/trino-plugin-delta-lakepkg:apk/chainguard/trino-plugin-druidpkg:apk/chainguard/trino-plugin-duckdbpkg:apk/chainguard/trino-plugin-elasticsearchpkg:apk/chainguard/trino-plugin-example-httppkg:apk/chainguard/trino-plugin-exasolpkg:apk/chainguard/trino-plugin-exchange-filesystempkg:apk/chainguard/trino-plugin-exchange-hdfspkg:apk/chainguard/trino-plugin-fakerpkg:apk/chainguard/trino-plugin-functions-pythonpkg:apk/chainguard/trino-plugin-geospatialpkg:apk/chainguard/trino-plugin-google-sheetspkg:apk/chainguard/trino-plugin-hivepkg:apk/chainguard/trino-plugin-http-event-listenerpkg:apk/chainguard/trino-plugin-http-server-event-listenerpkg:apk/chainguard/trino-plugin-hudipkg:apk/chainguard/trino-plugin-icebergpkg:apk/chainguard/trino-plugin-ignitepkg:apk/chainguard/trino-plugin-jmxpkg:apk/chainguard/trino-plugin-kafkapkg:apk/chainguard/trino-plugin-kafka-event-listenerpkg:apk/chainguard/trino-plugin-kinesispkg:apk/chainguard/trino-plugin-kudupkg:apk/chainguard/trino-plugin-lakehousepkg:apk/chainguard/trino-plugin-ldap-group-providerpkg:apk/chainguard/trino-plugin-local-filepkg:apk/chainguard/trino-plugin-lokipkg:apk/chainguard/trino-plugin-mariadbpkg:apk/chainguard/trino-plugin-memorypkg:apk/chainguard/trino-plugin-mlpkg:apk/chainguard/trino-plugin-mongodbpkg:apk/chainguard/trino-plugin-mysqlpkg:apk/chainguard/trino-plugin-mysql-event-listenerpkg:apk/chainguard/trino-plugin-opapkg:apk/chainguard/trino-plugin-openlineagepkg:apk/chainguard/trino-plugin-opensearchpkg:apk/chainguard/trino-plugin-oraclepkg:apk/chainguard/trino-plugin-password-authenticatorspkg:apk/chainguard/trino-plugin-phoenix5pkg:apk/chainguard/trino-plugin-pinotpkg:apk/chainguard/trino-plugin-postgresqlpkg:apk/chainguard/trino-plugin-prometheuspkg:apk/chainguard/trino-plugin-rangerpkg:apk/chainguard/trino-plugin-raptor-legacypkg:apk/chainguard/trino-plugin-redispkg:apk/chainguard/trino-plugin-redshiftpkg:apk/chainguard/trino-plugin-resource-group-managerspkg:apk/chainguard/trino-plugin-session-property-managerspkg:apk/chainguard/trino-plugin-singlestorepkg:apk/chainguard/trino-plugin-snowflakepkg:apk/chainguard/trino-plugin-spooling-filesystempkg:apk/chainguard/trino-plugin-sqlserverpkg:apk/chainguard/trino-plugin-teradata-functionspkg:apk/chainguard/trino-plugin-thriftpkg:apk/chainguard/trino-plugin-tpcdspkg:apk/chainguard/trino-plugin-tpchpkg:apk/chainguard/trino-plugin-verticapkg:apk/wolfi/trinopkg:apk/wolfi/trino-configpkg:apk/wolfi/trino-oci-entrypointpkg:apk/wolfi/trino-plugin-accumulopkg:apk/wolfi/trino-plugin-ai-functionspkg:apk/wolfi/trino-plugin-atoppkg:apk/wolfi/trino-plugin-bigquerypkg:apk/wolfi/trino-plugin-blackholepkg:apk/wolfi/trino-plugin-cassandrapkg:apk/wolfi/trino-plugin-clickhousepkg:apk/wolfi/trino-plugin-delta-lakepkg:apk/wolfi/trino-plugin-druidpkg:apk/wolfi/trino-plugin-duckdbpkg:apk/wolfi/trino-plugin-elasticsearchpkg:apk/wolfi/trino-plugin-example-httppkg:apk/wolfi/trino-plugin-exasolpkg:apk/wolfi/trino-plugin-exchange-filesystempkg:apk/wolfi/trino-plugin-exchange-hdfspkg:apk/wolfi/trino-plugin-fakerpkg:apk/wolfi/trino-plugin-functions-pythonpkg:apk/wolfi/trino-plugin-geospatialpkg:apk/wolfi/trino-plugin-google-sheetspkg:apk/wolfi/trino-plugin-hivepkg:apk/wolfi/trino-plugin-http-event-listenerpkg:apk/wolfi/trino-plugin-http-server-event-listenerpkg:apk/wolfi/trino-plugin-hudipkg:apk/wolfi/trino-plugin-icebergpkg:apk/wolfi/trino-plugin-ignitepkg:apk/wolfi/trino-plugin-jmxpkg:apk/wolfi/trino-plugin-kafkapkg:apk/wolfi/trino-plugin-kafka-event-listenerpkg:apk/wolfi/trino-plugin-kinesispkg:apk/wolfi/trino-plugin-kudupkg:apk/wolfi/trino-plugin-lakehousepkg:apk/wolfi/trino-plugin-ldap-group-providerpkg:apk/wolfi/trino-plugin-local-filepkg:apk/wolfi/trino-plugin-lokipkg:apk/wolfi/trino-plugin-mariadbpkg:apk/wolfi/trino-plugin-memorypkg:apk/wolfi/trino-plugin-mlpkg:apk/wolfi/trino-plugin-mongodbpkg:apk/wolfi/trino-plugin-mysqlpkg:apk/wolfi/trino-plugin-mysql-event-listenerpkg:apk/wolfi/trino-plugin-opapkg:apk/wolfi/trino-plugin-openlineagepkg:apk/wolfi/trino-plugin-opensearchpkg:apk/wolfi/trino-plugin-oraclepkg:apk/wolfi/trino-plugin-password-authenticatorspkg:apk/wolfi/trino-plugin-phoenix5pkg:apk/wolfi/trino-plugin-pinotpkg:apk/wolfi/trino-plugin-postgresqlpkg:apk/wolfi/trino-plugin-prometheuspkg:apk/wolfi/trino-plugin-rangerpkg:apk/wolfi/trino-plugin-raptor-legacypkg:apk/wolfi/trino-plugin-redispkg:apk/wolfi/trino-plugin-redshiftpkg:apk/wolfi/trino-plugin-resource-group-managerspkg:apk/wolfi/trino-plugin-session-property-managerspkg:apk/wolfi/trino-plugin-singlestorepkg:apk/wolfi/trino-plugin-snowflakepkg:apk/wolfi/trino-plugin-spooling-filesystempkg:apk/wolfi/trino-plugin-sqlserverpkg:apk/wolfi/trino-plugin-teradata-functionspkg:apk/wolfi/trino-plugin-thriftpkg:apk/wolfi/trino-plugin-tpcdspkg:apk/wolfi/trino-plugin-tpchpkg:apk/wolfi/trino-plugin-verticapkg:maven/org.apache.helix/helix-corepkg:maven/org.apache.helix/helix-rest
< 449-r0+ 135 more
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 449-r0
- (no CPE)range: < 1.3.0
- (no CPE)range: < 1.3.0
- Apache Software Foundation/Apache Helixv5Range: 0
Patches
209d210fa29b1Bump snakeyaml from 1.30 to 2.0 in /helix-core (#2398)
1 file changed · +1 −1
helix-core/pom.xml+1 −1 modified@@ -142,7 +142,7 @@ <dependency> <groupId>org.yaml</groupId> <artifactId>snakeyaml</artifactId> - <version>1.30</version> + <version>2.0</version> </dependency> <dependency> <groupId>io.dropwizard.metrics</groupId>
eabfda26b18cBump snakeyaml from 1.30 to 2.0 in /helix-rest (#2399)
1 file changed · +1 −1
helix-rest/pom.xml+1 −1 modified@@ -67,7 +67,7 @@ <dependency> <groupId>org.yaml</groupId> <artifactId>snakeyaml</artifactId> - <version>1.30</version> + <version>2.0</version> </dependency> <dependency> <groupId>org.slf4j</groupId>
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-jhcr-hph9-g7wmghsaADVISORY
- lists.apache.org/thread/zyqxhv0lc2z9w3tgr8ttrdy2zfh5jvc4ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2023-38647ghsaADVISORY
- github.com/apache/helix/commit/09d210fa29b18f3b4de8d32f2369dc2b31f71f43ghsaWEB
- github.com/apache/helix/commit/eabfda26b18c72f4f945dcaac5756665c6a2cdacghsaWEB
News mentions
0No linked articles in our index yet.