CVE-2025-29953

CRITICAL LAB

Apache ActiveMQ NMS OpenWire Client <2.1.1 - Deserialization

Title source: llm

Description

Deserialization of Untrusted Data vulnerability in Apache ActiveMQ NMS OpenWire Client. This issue affects Apache ActiveMQ NMS OpenWire Client before 2.1.1 when performing connections to untrusted servers. Such servers could abuse the unbounded deserialization in the client to provide malicious responses that may eventually cause arbitrary code execution on the client. Version 2.1.0 introduced a allow/denylist feature to restrict deserialization, but this feature could be bypassed. The .NET team has deprecated the built-in .NET binary serialization feature starting with .NET 9 and suggests migrating away from binary serialization. The project is considering to follow suit and drop this part of the NMS API altogether. Users are recommended to upgrade to version 2.1.1, which fixes the issue. We also recommend to migrate away from relying on .NET binary serialization as a hardening method for the future.

Exploits (1)

github WORKING POC 1 stars
by exploitintel · pythonpoc
https://github.com/exploitintel/eip-pocs-and-cves/tree/main/CVE-2025-29953

Scores

CVSS v3 9.8
EPSS 0.0046
EPSS Percentile 63.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Lab Environment

Lab screenshot
patched vulnerable
docker pull ghcr.io/exploitintel/cve-2025-29953-vulnerable:latest
All Labs GitHub

Classification

CWE
CWE-502
Status published

Affected Products (2)

apache/activemq_nms_openwire < 2.1.1
nuget/Apache.NMS.ActiveMQ < 2.1.1NuGet

Timeline

Published Apr 18, 2025
Tracked Since Feb 18, 2026