CVE-2025-66631

9.8 CRITICAL
Published: December 09, 2025 Modified: March 17, 2026
View on NVD

Description

CSLA .NET is a framework designed for the development of reusable, object-oriented business layers for applications. Versions 5.5.4 and below allow the use of WcfProxy. WcfProxy uses the now-obsolete NetDataContractSerializer (NDCS) and is vulnerable to remote code execution during deserialization. This vulnerability is fixed in version 6.0.0. To workaround this issue, remove the WcfProxy in data portal configurations.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/MarimerLLC/csla/issues/4001
Source: security-advisories@github.com
Issue Tracking
https://github.com/MarimerLLC/csla/pull/4018
Source: security-advisories@github.com
Issue Tracking Patch
https://github.com/MarimerLLC/csla/security/advisories/GHSA-wq34-7f4g-953v
Source: security-advisories@github.com
Mitigation Vendor Advisory

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
1.0%
77th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

marimer