A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will be released. Apache Tapestry 5 versions are not vulnerable to this issue. Users of Apache Tapestry 4 should upgrade to the latest Apache Tapestry 5 version.
Use CWE-502, Apache vendor hub and Tapestry product page to widen CVE-2020-17531 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-46366, CVE-2021-27850 and CVE-2019-10071 for nearby disclosures in the same product family.