Severity: important 

Affected versions:

- Apache Fory (pyfory) 0.13.0 before 1.0.0

Description:

Deserialization of untrusted data in Apache Fory PyFory. PyFory's 
ReduceSerializer could bypass documented DeserializationPolicy validation hooks 
during reduce-state restoration and global-name resolution. An application is 
vulnerable if it deserializes attacker-controlled data using PyFory 
Python-native mode with strict mode disabled and relies on 
DeserializationPolicy to restrict unsafe classes, functions, or module 
attributes.

This issue affects Apache Fory: from before 1.0.0.

Mitigation: Users of Apache Fory are recommended to upgrade to version 1.0.0 or 
later, which enforces DeserializationPolicy validation for the affected 
ReduceSerializer paths and thus fixes this issue.

Credit:

Lide Wen (reporter)

References:

https://fory.apache.org/security/#cve-2026-48207-pyfory-reduceserializer-deserializationpolicy-bypass
https://fory.apache.org
https://www.cve.org/CVERecord?id=CVE-2026-48207

Reply via email to