Back to VulnFeed / CVE-2026-41586
root@hackertop:~/vulnfeed/CVE-2026-41586#
CVE-2026-41586 HIGH Deserialization ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

hyperledger fabric up to 2.2.26 Channel.java readObject deserialization

fabric 14d ago Impact pending confirmation
LIFECYCLE
7.1 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in hyperledger fabric up to 2.2.26. It has been rated as critical. This issue affects the function readObject of the file Channel.java. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
Using CWE to declare the problem leads to CWE-502. The product deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

Impact: Impacted is confidentiality, integrity, and availability.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-41586 · CVSS 7.1 · Active Threat