VYPR
High severityNVD Advisory· Published Dec 9, 2025· Updated Dec 9, 2025

CSLA .NET is vulnerable to Remote Code Execution via WcfProxy

CVE-2025-66631

Description

CSLA .NET is a framework designed for the development of reusable, object-oriented business layers for applications. Versions 5.5.4 and below allow the use of WcfProxy. WcfProxy uses the now-obsolete NetDataContractSerializer (NDCS) and is vulnerable to remote code execution during deserialization. This vulnerability is fixed in version 6.0.0. To workaround this issue, remove the WcfProxy in data portal configurations.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CSLA .NET <= 5.5.4 includes WcfProxy using NetDataContractSerializer, enabling remote code execution via deserialization.

Vulnerability

CSLA .NET versions 5.5.4 and below expose the WcfProxy component, which relies on the now-obsolete NetDataContractSerializer (NDCS) for deserialization. NDCS is inherently insecure because it allows deserializing arbitrary types without restriction, making it a vector for remote code execution (RCE) attacks [1][2][3]. The framework's data portal configuration can invoke WcfProxy, which triggers NDCS deserialization on potentially untrusted data.

Exploitation

An attacker can craft malicious serialized data containing unexpected or dangerous types. When the CSLA framework deserializes this data using WcfProxy, the NetDataContractSerializer will instantiate the attacker's chosen types, potentially executing arbitrary code on the server or client application that performs deserialization [3]. No special authentication is required beyond access to the deserialization endpoint; the root cause is the use of an insecure deserialization primitive that does not validate or restrict incoming types.

Impact

Successful exploitation grants the attacker the ability to execute arbitrary commands in the context of the application process. This could lead to full system compromise, data exfiltration, or further lateral movement within a networked environment [1][3].

Mitigation

The vulnerability is fixed in version 6.0.0 of CSLA .NET, where the risky serialization components (NetDataContractSerializerWrapper and related binary formatter code) have been removed in favor of the safer MobileFormatter [2][4]. For users who cannot upgrade, the recommended workaround is to disable or remove WcfProxy from data portal configurations entirely [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
CslaNuGet
< 6.0.06.0.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.