FASTJSON Includes Functionality from Untrusted Control Sphere
Critical severity
GitHub Reviewed
Published
Jan 9, 2026
to the GitHub Advisory Database
•
Updated Jan 9, 2026
Description
Published by the National Vulnerability Database
Jan 9, 2026
Published to the GitHub Advisory Database
Jan 9, 2026
Reviewed
Jan 9, 2026
Last updated
Jan 9, 2026
Fastjson before 1.2.48 mishandles autoType because, when an
@typekey is in a JSON document, and the value of that key is the name of a Java class, there may be calls to certain public methods of that class. Depending on the behavior of those methods, there may be JNDI injection with an attacker-supplied payload located elsewhere in that JSON document. This was exploited in the wild in 2023 through 2025. NOTE: this issue exists because of an incomplete fix for CVE-2017-18349. Also, a later bypass is covered by CVE-2022-25845.References