Loading
A remote code execution vulnerability exists where a malicious Raft node can exploit insecure Hessian deserialization within the PD store. The fix enforces IP-based authentication to restrict cluster membership and implements a strict class whitelist to harden the Hessian serialization process against object injection attacks. Users are recommended to upgrade to version 1.7.0, which fixes the issue.
Use CWE-502, Apache vendor hub and Hugegraph product page to widen CVE-2025-26866 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-27348, CVE-2024-43441 and CVE-2024-27349 for nearby disclosures in the same product family.