The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-39154

CVE-2021-39154: XStream XML Serialization RCE Vulnerability

CVE-2021-39154 is a remote code execution vulnerability in XStream's XML serialization library that allows attackers to load and execute arbitrary code. This article covers technical details, affected versions, and mitigation.

Published: February 25, 2026

CVE-2021-39154 Overview

CVE-2021-39154 is an insecure deserialization vulnerability affecting XStream, a popular Java library used to serialize objects to XML and back again. This vulnerability allows a remote attacker to load and execute arbitrary code from a remote host by manipulating the processed input stream. The flaw exists in versions prior to 1.4.18 that rely on a blacklist-based security approach, which has proven insufficient for general-purpose protection.

Organizations using XStream without properly configured security frameworks with whitelist restrictions are at significant risk. The vulnerability highlights the fundamental weaknesses of blacklist-based security models in deserialization contexts, where attackers continuously discover new gadget chains to bypass restrictions.

Critical Impact

Remote attackers can achieve arbitrary code execution on vulnerable systems by sending specially crafted XML payloads, potentially leading to complete system compromise across enterprise environments.

Affected Products

  • XStream versions prior to 1.4.18
  • Fedora 33, 34, and 35
  • Debian Linux 9.0, 10.0, and 11.0
  • NetApp SnapManager for Oracle and SAP
  • Oracle Business Activity Monitoring 12.2.1.4.0
  • Oracle Commerce Guided Search 11.3.2
  • Oracle Communications Billing and Revenue Management Elastic Charging Engine 11.3 and 12.0
  • Oracle Communications Cloud Native Core products (multiple versions)
  • Oracle Communications Unified Inventory Management 7.3.4 through 7.4.2
  • Oracle Retail XStore Point of Service (multiple versions)
  • Oracle Utilities Framework and Testing Accelerator
  • Oracle WebCenter Portal 12.2.1.3.0 and 12.2.1.4.0

Discovery Timeline

  • August 23, 2021 - CVE-2021-39154 published to NVD
  • May 23, 2025 - Last updated in NVD database

Technical Details for CVE-2021-39154

Vulnerability Analysis

This vulnerability represents an insecure deserialization flaw within XStream's XML processing capabilities. The core issue stems from XStream's default reliance on a blacklist-based security model to prevent dangerous class instantiation during deserialization. When processing untrusted XML input, attackers can craft payloads that leverage classes not included in the blacklist to achieve code execution.

The impact is particularly severe in enterprise environments where XStream is embedded within larger application stacks, including numerous Oracle products, NetApp SnapManager, and various Linux distributions. The network-accessible attack surface combined with the potential for code execution with elevated privileges makes this vulnerability a significant concern for organizations running affected software.

Users who implemented XStream's security framework with a whitelist limited to minimal required types are not affected. However, default configurations and implementations that did not follow this recommendation remain vulnerable to exploitation.

Root Cause

The root cause of CVE-2021-39154 is the inherent weakness of blacklist-based security controls in the context of Java deserialization. XStream versions prior to 1.4.18 attempted to prevent exploitation by maintaining a list of known dangerous classes that should not be instantiated during deserialization. However, this approach is fundamentally flawed because:

  1. Incomplete Coverage: The Java ecosystem contains countless classes that can be chained together to achieve code execution, and maintaining a comprehensive blacklist is practically impossible.

  2. Gadget Chain Discovery: Security researchers continuously discover new "gadget chains" - sequences of method calls that can be triggered through deserialization to achieve malicious outcomes.

  3. Default Permissive Behavior: The default configuration allowed any class not explicitly blacklisted, creating a large attack surface.

Attack Vector

The attack vector for CVE-2021-39154 involves network-based exploitation where an attacker sends a specially crafted XML payload to an application using a vulnerable XStream instance. The attack flow proceeds as follows:

  1. The attacker identifies an application endpoint that processes XML input using XStream
  2. A malicious XML payload is crafted containing references to classes that bypass the blacklist
  3. The payload is submitted to the target application via the network
  4. XStream deserializes the XML, instantiating the specified classes
  5. The instantiation triggers a gadget chain leading to arbitrary code execution
  6. The attacker's code executes in the context of the application, potentially with elevated privileges

The vulnerability requires low privileges but has high attack complexity due to the need to identify appropriate gadget chains for the target environment. Successful exploitation can result in complete compromise of confidentiality, integrity, and availability of the affected system.

Detection Methods for CVE-2021-39154

Indicators of Compromise

  • Unusual XML payloads containing references to unexpected Java classes such as javax.imageio.ImageIO, java.beans.EventHandler, or other known gadget chain components
  • Unexpected network connections initiated by Java applications to external hosts following XML processing
  • Creation of suspicious processes spawned by Java application processes
  • Log entries indicating deserialization errors or class instantiation failures that may indicate exploitation attempts

Detection Strategies

  • Deploy application-layer firewalls with rules to inspect XML payloads for suspicious class references commonly used in deserialization attacks
  • Implement Java agent-based monitoring to detect and alert on instantiation of classes commonly used in gadget chains
  • Enable verbose logging for XStream operations and configure SIEM rules to alert on deserialization anomalies
  • Use dependency scanning tools to identify applications using vulnerable XStream versions across the enterprise

Monitoring Recommendations

  • Configure network monitoring to detect unusual outbound connections from servers running Java applications, particularly to external hosts
  • Implement file integrity monitoring on systems running affected applications to detect unauthorized modifications
  • Monitor Java process behavior for unexpected child process creation or file system modifications
  • Review application logs regularly for deserialization-related exceptions that may indicate reconnaissance or exploitation attempts

How to Mitigate CVE-2021-39154

Immediate Actions Required

  • Upgrade XStream to version 1.4.18 or later, which implements a whitelist-based security model by default
  • If immediate upgrade is not possible, configure XStream's security framework with a whitelist limited to only the minimal required types for your application
  • Audit all applications in your environment to identify those using XStream and prioritize remediation based on exposure
  • Apply vendor patches from Oracle, NetApp, Debian, and Fedora for affected products as they become available

Patch Information

The primary fix for CVE-2021-39154 is upgrading to XStream version 1.4.18 or later. This version fundamentally changes the security model from blacklist to whitelist, requiring explicit configuration of allowed types. Organizations should consult the following vendor advisories for specific patch information:

  • XStream CVE-2021-39154 Details - Official XStream security advisory
  • GitHub Security Advisory - Technical details and remediation guidance
  • Oracle Critical Patch Update January 2022 - Patches for affected Oracle products
  • Oracle Critical Patch Update April 2022 - Additional Oracle product patches
  • Debian Security Advisory - Debian package updates
  • NetApp Security Advisory - SnapManager patches

Workarounds

  • Configure XStream with a whitelist of explicitly allowed types using XStream.allowTypes() or XStream.allowTypesByWildcard() methods
  • Implement input validation to reject XML payloads containing unexpected or suspicious class references before they reach XStream
  • Deploy network segmentation to limit the potential impact of successful exploitation by restricting lateral movement
  • Consider disabling or removing XStream functionality from applications where XML serialization is not strictly required
bash
# Example XStream security configuration (Java code concept)
# Configure whitelist-based security in your application:
# xstream.allowTypes(new Class[] { MyClass.class, MyOtherClass.class });
# xstream.allowTypesByWildcard(new String[] { "com.mycompany.**" });

# Verify XStream version in Maven projects
mvn dependency:tree | grep xstream

# Check for vulnerable versions in Gradle projects
gradle dependencies | grep xstream

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechXstream

  • SeverityHIGH

  • CVSS Score8.5

  • EPSS Probability0.73%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-434
  • Technical References
  • GitHub Security Advisory

  • Debian LTS Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • NetApp Security Advisory

  • Debian Security Advisory

  • Oracle Critical Patch Update July 2022

  • XStream CVE-2021-39154 Details
  • Vendor Resources
  • Oracle Critical Patch Update April 2022

  • Oracle Critical Patch Update January 2022
  • Related CVEs
  • CVE-2021-29505: XStream Java Library RCE Vulnerability

  • CVE-2021-21347: NetApp OnCommand Insight RCE Vulnerability

  • CVE-2020-26217: XStream RCE Vulnerability

  • CVE-2021-39139: XStream Library RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English