Description
Open Access Management (OpenAM) is an access management solution. Prior to 16.0.6, OpenIdentityPlatform OpenAM is vulnerable to pre-authentication Remote Code Execution (RCE) via unsafe Java deserialization of the jato.clientSession HTTP parameter. This bypasses the WhitelistObjectInputStream mitigation that was applied to the jato.pageSession parameter after CVE-2021-35464. An unauthenticated attacker can achieve arbitrary command execution on the server by sending a crafted serialized Java object as the jato.clientSession GET/POST parameter to any JATO ViewBean endpoint whose JSP contains <jato:form> tags (e.g., the Password Reset pages). This vulnerability is fixed in 16.0.6.
INFO
Published Date :
2026-04-07T20:46:33.739Z
Last Modified :
2026-04-08T16:14:49.293Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-33439 vulnerability.
| Vendors | Products |
|---|---|
| Openidentityplatform |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-33439.