What kind of vulnerability is it? Who is impacted?
This is a disclosure for a security vulnerability in the SparseMatrix
class. The vulnerability is a deserialization issue that
can lead to a wide range of privilege escalations depending on the circumstances. The problematic area is the read
method
of the SparseMatrix
class.
This method takes in an InputStream
and returns a SparseMatrix
object. We consider this to be a method that can be
exposed to untrusted input in at least two use cases:
- A user can adopt this method in an application where users can submit an InputStream
and the application parses it into
a SparseMatrix
. This can be a multi-tenant application that hosts many different users perhaps with different privilege
levels.
- A user adopts the method for a local tool but receives the InputStream
from external sources.
You are vulnerable if you import non-controlled serialized SparseMatrix
objects.
com.powsybl:powsybl-math:6.7.2 and higher
Is there a way for users to fix or remediate the vulnerability without upgrading?
Do not use SparseMatrix
deserialization (SparseMatrix.read(...)
methods).
{ "github_reviewed_at": "2025-06-19T16:19:16Z", "cwe_ids": [ "CWE-502" ], "nvd_published_at": "2025-06-20T00:15:29Z", "severity": "HIGH", "github_reviewed": true }