Apache Avro
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Apache Avro.
By the Year
In 2026 there have been 1 vulnerability in Apache Avro with an average score of 7.3 out of ten. Avro did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2026 as compared to last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 7.30 |
| 2025 | 0 | 0.00 |
| 2024 | 1 | 0.00 |
| 2023 | 1 | 7.50 |
| 2022 | 4 | 7.50 |
| 2021 | 0 | 0.00 |
| 2020 | 0 | 0.00 |
| 2019 | 1 | 0.00 |
It may take a day or so for new Avro vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Apache Avro Security Vulnerabilities
Apache Avro Java SDK 1.11.x/1.12.0 Code Injection from Malicious Schemas
CVE-2025-33042
7.3 - High
- February 13, 2026
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Avro Java SDK when generating specific records from untrusted Avro schemas. This issue affects Apache Avro Java SDK: all versions through 1.11.4 and version 1.12.0. Users are recommended to upgrade to version 1.12.1 or 1.11.5, which fix the issue.
Code Injection
Apache Avro 1.11.x Java SDK Schema Parsing Arbitrary Code Exec
CVE-2024-47561
- October 03, 2024
Schema parsing in the Java SDK of Apache Avro 1.11.3 and previous versions allows bad actors to execute arbitrary code. Users are recommended to upgrade to version 1.11.4 or 1.12.0, which fix this issue.
Marshaling, Unmarshaling
Apache Avro Java SDK <=1.11.2: Deserialization OOB Read/OOM
CVE-2023-39410
7.5 - High
- September 29, 2023
When deserializing untrusted or corrupted data, it is possible for a reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Java applications using Apache Avro Java SDK up to and including 1.11.2. Users should update to apache-avro version 1.11.3 which addresses this issue.
Marshaling, Unmarshaling
Crash in Apache Avro Rust SDK <0.14.0 via corrupted data
CVE-2022-36125
7.5 - High
- August 09, 2022
It is possible to crash (panic) an application by providing a corrupted data to be read. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
Integer Overflow or Wraparound
Denial of Service via Infinite Loop in Apache Avro Rust SDK <0.14.0
CVE-2022-35724
7.5 - High
- August 09, 2022
It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
Infinite Loop
Apache Avro Rust SDK <0.14.0: OOM via Reader
CVE-2022-36124
7.5 - High
- August 09, 2022
It is possible for a Reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
Allocation of Resources Without Limits or Throttling
A vulnerability in the .NET SDK of Apache Avro
CVE-2021-43045
7.5 - High
- January 06, 2022
A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue.
Allocation of Resources Without Limits or Throttling
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT
CVE-2019-17195
- October 15, 2019
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Apache Avro or by Apache? Click the Watch button to subscribe.