VYPR
Medium severity6.3NVD Advisory· Published Mar 12, 2026· Updated Apr 29, 2026

CVE-2026-3967

CVE-2026-3967

Description

A flaw has been found in Alfresco Activiti up to 7.19/8.8.0. Affected by this issue is the function deserialize/createObjectInputStream of the file activiti-core/activiti-engine/src/main/java/org/activiti/engine/impl/variable/SerializableType.java of the component Process Variable Serialization System. This manipulation causes deserialization. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Activiti up to 7.20/8.8.0 deserializes untrusted Java objects via ObjectInputStream, enabling remote code execution through gadget chains.

Root

Cause A deserialization vulnerability exists in the Activiti process variable serialization system. The SerializableType.java class in activiti-engine overrides resolveClass() to use ReflectUtil.loadClass() without any validation, and the deserialize() method uses ObjectInputStream.readObject() unconditionally [1]. When a user sets a process variable through REST or Java APIs, the object is serialized and stored; later access triggers automatic deserialization of the stored bytes, allowing arbitrary class loading from the classpath.

Exploitation

An attacker with basic user privileges can exploit this by sending a crafted serialized Java object via the REST API or Java API as a process variable [1]. The payload is stored in the database and, upon deserialization during normal process execution, triggers a gadget chain (e.g., using Spring Framework, Jakarta Expression Language, or Apache Commons Collections) to execute arbitrary code on the server. The exploit has been published, lowering the barrier for attack.

Impact

Successful exploitation leads to remote code execution on the Activiti server. An attacker can gain full control of the application and underlying host, potentially leaking sensitive data, modifying processes, or pivoting to internal systems.

Mitigation

The vendor was contacted but did not respond. Affected versions include Activiti ≤ 7.20 and Activiti ≤ 8.8.0 [1]. No official patch or workaround has been provided. Organizations should restrict network access to the REST API, apply strict input validation, or upgrade to a fixed version if one becomes available.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.