Changeflow GovPing Data Privacy & Cybersecurity FasterXML Jackson Vulnerability - Security Bypa...
Priority review Notice Added Final

FasterXML Jackson Vulnerability - Security Bypass (CVSS 7.5)

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published
Detected
Email

Summary

CERT-Bund issued a security advisory regarding a vulnerability in FasterXML Jackson versions 3.0.0 through 3.1.0. The vulnerability, with a CVSS Base Score of 7.5, allows remote anonymous attackers to bypass security measures in the JSON processing library. Affected platforms include Linux, Windows, UNIX, and other operating systems running Java applications that utilize the library.

What changed

CERT-Bund published advisory WID-SEC-2026-0969 disclosing a high-severity vulnerability in FasterXML Jackson JSON processing library. The vulnerability enables remote unauthenticated attackers to circumvent security controls. All organizations running Java applications with affected Jackson versions (3.0.0-3.1.0) on Linux, Windows, UNIX, or other platforms are potentially exposed.

Organizations utilizing this widely-adopted Java library should prioritize vulnerability assessment and patch management. Failure to address this vulnerability could result in security bypass attacks compromising application integrity and confidentiality.

What to do next

  1. Identify and audit systems using FasterXML Jackson 3.0.0-3.1.0 for exposure
  2. Apply vendor patches or mitigation measures as soon as available
  3. Review and update security configurations for JSON processing in affected applications

Archived snapshot

Apr 8, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

[WID-SEC-2026-0969] FasterXML Jackson: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen CVSS Base Score 7.5 (hoch) CVSS Temporal Score 6.7 (mittel) Remoteangriff ja Datum 06.04.2026 Stand 07.04.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

Jackson ist eine quelloffene Bibliothek zur JSON-Verarbeitung in Java.

Produkte

06.04.2026
- FasterXML Jackson 3.0.0-3.1.0

Angriff

Angriff

Ein entfernter, anonymer Angreifer kann eine Schwachstelle in FasterXML Jackson ausnutzen, um Sicherheitsvorkehrungen zu umgehen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Get daily alerts for CERT-Bund Security Advisories

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
CERT-Bund
Published
April 6th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive
Document ID
WID-SEC-2026-0969

Who this affects

Applies to
Technology companies Manufacturers
Industry sector
5112 Software & Technology
Activity scope
Software vulnerability management JSON processing security Java application security
Geographic scope
Germany DE

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Compliance frameworks
NIST CSF
Topics
Data Privacy Software & Technology

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!