Apache HugeGraph-Server: RAFT and deserialization vulnerability
Description
A remote code execution vulnerability exists where a malicious Raft node can exploit insecure Hessian deserialization within the PD store. The fix enforces IP-based authentication to restrict cluster membership and implements a strict class whitelist to harden the Hessian serialization process against object injection attacks.
Users are recommended to upgrade to version 1.7.0, which fixes the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2025-26866: A remote code execution vulnerability in Apache HugeGraph-Server via insecure Hessian deserialization in the PD store, fixed in version 1.7.0.
Vulnerability
Overview
CVE-2025-26866 is a remote code execution (RCE) vulnerability in the PD store of Apache HugeGraph-Server. The root cause lies in insecure Hessian deserialization, which allows a malicious Raft node to inject arbitrary objects and execute code. The vulnerability affects versions 1.0.0 through 1.5.0 [1][2].
Attack
Vector and Prerequisites
An attacker must be able to act as a malicious Raft node within the cluster. By sending specially crafted Hessian serialized data to the PD store, the attacker can trigger object injection. The fix addresses this by enforcing IP-based authentication to restrict cluster membership and implementing a strict class whitelist for the Hessian serialization process [3][4].
Impact and
Mitigation
Successful exploitation grants the attacker remote code execution within the context of the HugeGraph-Server process, potentially leading to full compromise of the database server and its data. Users are strongly recommended to upgrade to HugeGraph-Server version 1.7.0, which contains the security fixes [1][2][3].
- GitHub - apache/hugegraph: A graph database that supports more than 100+ billion data, high performance and scalability (Include OLTP Engine & REST-API & Backends)
- NVD - CVE-2025-26866
- security - CVE-2025-26866: Apache HugeGraph-Server: RAFT and deserialization vulnerability
- refactor: adjust the related filters of sofa-bolt by haohao0103 · Pull Request #2735 · apache/hugegraph
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.hugegraph:hg-pd-coreMaven | < 1.7.0 | 1.7.0 |
Affected products
1- Range: 1.0.0, 1.2.0, 1.3.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/apache/incubator-hugegraph/pull/2735ghsapatchWEB
- github.com/advisories/GHSA-q37j-3367-fwv7ghsaADVISORY
- lists.apache.org/thread/ko8jkwbjbb99m45pg4sgo5xsm8gx9nsqghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2025-26866ghsaADVISORY
- www.openwall.com/lists/oss-security/2025/12/09/1ghsaWEB
News mentions
0No linked articles in our index yet.