Web Security
Deserialization
Insecure deserialization occurs when an application deserializes untrusted data without proper validation, potentially allowing attackers to manipulate serialized objects to achieve arbitrary code execution, authentication bypass, or data tampering. The Apache Log4j RCE vulnerability (Log4Shell) was triggered via deserialization in JNDI lookups. Java, PHP, and Python pickle deserialization are particularly prone to this class of vulnerability. Prevention requires avoiding deserialization of untrusted data and using integrity checks on serialized objects.
Official documentationWhy it matters for your website
- 1Listed in the OWASP Top 10 — one of the most critical web risks
- 2Can lead to data exfiltration, account takeover, or full system compromise
- 3Required to fix before passing security reviews for enterprise customers