Advisory Details

June 27th, 2025

(0Day) Mescius ActiveReports.NET TypeResolutionService Deserialization of Untrusted Data Remote Code Execution Vulnerability

ZDI-25-449
ZDI-CAN-25397

CVE ID CVE-2025-6811
CVSS SCORE 9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Mescius
AFFECTED PRODUCTS ActiveReports.NET
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mescius ActiveReports.NET. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the TypeResolutionService class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process.

ADDITIONAL DETAILS

11/08/24 – ZDI submitted the report to the vendor
11/08/24 – the vendor acknowledged the receipt of the report
01/07/25 – the vendor communicated that the reported behaviour was not secure by design
01/09/25 – ZDI replied with an evidence form the product’s documentation
01/15/25 – the vendor confirmed that there wouldn’t be a security issue if the report uploading task were done by internal trusted developers
06/19/25 - ZDI notified the vendor of the intention to publish the case as 0-day advisory
-- Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product


DISCLOSURE TIMELINE
  • 2024-11-08 - Vulnerability reported to vendor
  • 2025-06-27 - Coordinated public release of advisory
  • 2025-06-27 - Advisory Updated
CREDIT Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative
BACK TO ADVISORIES