SB20260427154 - Remote code execution in c3p0



SB20260427154 - Remote code execution in c3p0

Published: April 27, 2026

Security Bulletin ID SB20260427154
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Deserialization of Untrusted Data (CVE-ID: CVE-2026-27830)

The vulnerability allows a remote user to execute arbitrary code.

The vulnerability exists due to unsafe deserialization in the userOverridesAsString property of c3p0 ConnectionPoolDataSource implementations when processing maliciously crafted Java-serialized objects or javax.naming.Reference instances. A remote user can reset this property or supply crafted serialized objects or references to execute arbitrary code.

The impact can be amplified when embedded JNDI references trigger dereferencing of a remote factoryClassLocation.


Remediation

Install update from vendor's website.