Description
A remote code execution vulnerability exists where a malicious Raft node can exploit insecure Hessian deserialization within the PD store. The fix enforces IP-based authentication to restrict cluster membership and implements a strict class whitelist to harden the Hessian serialization process against object injection attacks. Users are recommended to upgrade to version 1.7.0, which fixes the issue.
Exploits (1)
github
WORKING POC
1 stars
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2025-26866
Scores
CVSS v3
8.8
EPSS
0.0127
EPSS Percentile
79.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lab Environment
vulnerable
docker pull ghcr.io/exploitintel/cve-2025-26866-vulnerable:latest
Classification
CWE
CWE-502
Status
published
Affected Products (2)
apache/hugegraph
< 1.7.0
org.apache.hugegraph/hg-pd-core
< 1.7.0Maven
Timeline
Published
Dec 12, 2025
Tracked Since
Feb 18, 2026