Avro Apache Avro

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Apache Avro.

By the Year

In 2026 there have been 1 vulnerability in Apache Avro with an average score of 7.3 out of ten. Avro did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2026 as compared to last year.




Year Vulnerabilities Average Score
2026 1 7.30
2025 0 0.00
2024 1 0.00
2023 1 7.50
2022 4 7.50
2021 0 0.00
2020 0 0.00
2019 1 0.00

It may take a day or so for new Avro vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Apache Avro Security Vulnerabilities

Apache Avro Java SDK 1.11.x/1.12.0 Code Injection from Malicious Schemas
CVE-2025-33042 7.3 - High - February 13, 2026

Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Avro Java SDK when generating specific records from untrusted Avro schemas. This issue affects Apache Avro Java SDK: all versions through 1.11.4 and version 1.12.0. Users are recommended to upgrade to version 1.12.1 or 1.11.5, which fix the issue.

Code Injection

Apache Avro 1.11.x Java SDK Schema Parsing Arbitrary Code Exec
CVE-2024-47561 - October 03, 2024

Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to execute arbitrary code. Users are recommended to upgrade to version 1.11.4  or 1.12.0, which fix this issue.

Marshaling, Unmarshaling

Apache Avro Java SDK <=1.11.2: Deserialization OOB Read/OOM
CVE-2023-39410 7.5 - High - September 29, 2023

When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.

Marshaling, Unmarshaling

Crash in Apache Avro Rust SDK <0.14.0 via corrupted data
CVE-2022-36125 7.5 - High - August 09, 2022

It is possible to crash (panic) an application by providing a corrupted data to be read. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.

Integer Overflow or Wraparound

Denial of Service via Infinite Loop in Apache Avro Rust SDK <0.14.0
CVE-2022-35724 7.5 - High - August 09, 2022

It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.

Infinite Loop

Apache Avro Rust SDK <0.14.0: OOM via Reader
CVE-2022-36124 7.5 - High - August 09, 2022

It is possible for a Reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.

Allocation of Resources Without Limits or Throttling

A vulnerability in the .NET SDK of Apache Avro
CVE-2021-43045 7.5 - High - January 06, 2022

A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue.

Allocation of Resources Without Limits or Throttling

Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT
CVE-2019-17195 - October 15, 2019

Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Apache Avro or by Apache? Click the Watch button to subscribe.

Apache
Vendor

Apache Avro
Product

subscribe