CSLA .NET is a framework designed for the development of reusable, object-oriented business layers for applications. Versions 5.5.4 and below allow the use of WcfProxy. WcfProxy uses the now-obsolete NetDataContractSerializer (NDCS) and is vulnerable to remote code execution during deserialization. This vulnerability is fixed in version 6.0.0. To workaround this issue, remove the WcfProxy in data portal configurations.
History

Tue, 09 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Marimer
Marimer csla
Vendors & Products Marimer
Marimer csla

Tue, 09 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description CSLA .NET is a framework designed for the development of reusable, object-oriented business layers for applications. Versions 5.5.4 and below allow the use of WcfProxy. WcfProxy uses the now-obsolete NetDataContractSerializer (NDCS) and is vulnerable to remote code execution during deserialization. This vulnerability is fixed in version 6.0.0. To workaround this issue, remove the WcfProxy in data portal configurations.
Title CSLA .NET is vulnerable to Remote Code Execution via WcfProxy
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-12-09T03:18:37.698Z

Updated: 2025-12-09T15:15:06.460Z

Reserved: 2025-12-05T15:42:44.716Z

Link: CVE-2025-66631

cve-icon Vulnrichment

Updated: 2025-12-09T15:15:02.820Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-09T16:18:22.103

Modified: 2025-12-09T18:36:53.557

Link: CVE-2025-66631

cve-icon Redhat

No data.