oss-sec mailing list archives
CVE-2026-48207: Apache Fory: PyFory ReduceSerializer Incomplete Policy Enforcement
From: Chaokun Yang <chaokunyang () apache org>
Date: Thu, 21 May 2026 12:44:24 +0000
Severity: important Affected versions: - Apache Fory (pyfory) 0.13.0 before 1.0.0 Description: Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializer could bypass documented DeserializationPolicy validation hooks during reduce-state restoration and global-name resolution. An application is vulnerable if it deserializes attacker-controlled data using PyFory Python-native mode with strict mode disabled and relies on DeserializationPolicy to restrict unsafe classes, functions, or module attributes. This issue affects Apache Fory: from before 1.0.0. Mitigation: Users of Apache Fory are recommended to upgrade to version 1.0.0 or later, which enforces DeserializationPolicy validation for the affected ReduceSerializer paths and thus fixes this issue. Credit: Lide Wen (reporter) References: https://fory.apache.org/security/#cve-2026-48207-pyfory-reduceserializer-deserializationpolicy-bypass https://fory.apache.org https://www.cve.org/CVERecord?id=CVE-2026-48207
Current thread:
- CVE-2026-48207: Apache Fory: PyFory ReduceSerializer Incomplete Policy Enforcement Chaokun Yang (May 21)
