VYPR
High severityNVD Advisory· Published Feb 29, 2024· Updated Nov 4, 2025

CVE-2024-22871

CVE-2024-22871

Description

An issue in Clojure versions 1.20 to 1.12.0-alpha5 allows an attacker to cause a denial of service (DoS) via the clojure.core$partial$fn__5920 function.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2024-22871: A denial of service vulnerability in Clojure versions 1.20 to 1.12.0-alpha5 allows remote attackers to cause resource exhaustion via deserialization triggering recursive hash calculations.

Vulnerability

Overview CVE-2024-22871 is a denial of service (DoS) vulnerability affecting Clojure versions 1.20 through 1.12.0-alpha5 [1][2]. The issue resides in the clojure.core$partial$fn__5920 function and stems from improper handling of specially crafted objects during deserialization, leading to uncontrolled hashcode computations [3].

Exploitation

Mechanism An attacker can exploit this vulnerability by providing malicious serialized data to a Clojure application that deserializes user-controlled input. The proof-of-concept demonstrates that by constructing objects with manipulated hash values (e.g., setting _hash to 1), the application enters a recursive hash calculation loop, exhausting CPU resources [2][3]. No authentication is required if the application exposes deserialization endpoints to unauthenticated users.

Impact

Successful exploitation results in a denial of service condition, rendering the affected service unresponsive due to excessive CPU consumption. The vulnerability can be triggered remotely without special privileges, making it a significant availability risk for systems running the affected Clojure versions [2][3].

Mitigation

As of the publication date, the vulnerability has not been patched; it affects Clojure up to version 1.12.0-alpha5. Users are advised to monitor the Clojure project for security updates and to restrict deserialization of untrusted data as a workaround [1][3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.clojure:clojureMaven
>= 1.7.0, < 1.11.21.11.2
org.clojure:clojureMaven
>= 1.12.0-alpha1, < 1.12.0-alpha91.12.0-alpha9

Affected products

6

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

13

News mentions

0

No linked articles in our index yet.