CVE-2020-17531

Remote Code Execution
Affects
Apache Tapestry
in
Apache Tapestry
No items found.
Versions
>=4.0.0, <=4.1.6
Exclamation circle icon
Patch Available

This Vulnerability has been fixed in the Never-Ending Support (NES) version offered by HeroDevs.

Overview

Apache Tapestry is an open-source framework for building web applications in Java.

A remote code execution vulnerability (CVE-2020-17531) has been identified in Apache Tapestry, caused by an unsafe use of Java's built-in serialization mechanism. This flaw allows attackers to execute arbitrary Java code on an application that processes untrusted data passed in the sp parameter of a request to the application.

Per OWASP: Code Injection is the general term for attack types which consist of injecting code that is then interpreted/executed by the application. This type of attack exploits poor handling of untrusted data. These types of attacks are usually made possible due to a lack of proper input/output data validation.

Details

Module Info

Vulnerability Info

This Critical severity vulnerability affects Apache Tapestry versions 4.0.0 through 4.1.6. Apache Tapestry 5.x versions are not affected.

Requests sent to a Tapestry application can contain an sp request parameter. The values provided by this parameter are specially-crafted strings that are converted to other data types by a DataSqueezer component in the framework. If the DataSqueezer determines that the value of the sp request parameter is a base-64 encoded string that represents a Java object, it will deserialize the string using ObjectInputStream.readObject() with no class filtering. This can lead to untrusted code being executed by the application. 

Mitigation

Apache Tapestry 4.x is End-of-Life and will not receive any updates to address this issue. 

Users of the affected components should apply one of the following mitigations:

  • Upgrade applications to use Apache Tapestry 5.x.
  • Leverage a commercial support partner like HeroDevs for post-EOL security support.
Vulnerability Details
Severity
Level
CVSS Assessment
Low
>=0 <4
Medium
>=4 <6
High
>=6 <8
Critical
>=8 <10
Critical
ID
CVE-2020-17531
PROJECT Affected
Apache Tapestry
Versions Affected
>=4.0.0, <=4.1.6
NES Versions Affected
Published date
March 18, 2026
≈ Fix date
March 16, 2026
Category
Remote Code Execution
Vex Document
Download VEXHow do I use it?
Sign up for the latest vulnerability alerts fixed in
NES for Apache Tapestry
Rss feed icon
Subscribe via RSS
or

By clicking “submit” I acknowledge receipt of our Privacy Policy.

Thanks for signing up for our Newsletter! We look forward to connecting with you.
Oops! Something went wrong while submitting the form.