Web Security

Deserialization

Insecure deserialization occurs when an application deserializes untrusted data without proper validation, potentially allowing attackers to manipulate serialized objects to achieve arbitrary code execution, authentication bypass, or data tampering. The Apache Log4j RCE vulnerability (Log4Shell) was triggered via deserialization in JNDI lookups. Java, PHP, and Python pickle deserialization are particularly prone to this class of vulnerability. Prevention requires avoiding deserialization of untrusted data and using integrity checks on serialized objects.

Official documentation

Why it matters for your website

  • 1Listed in the OWASP Top 10 — one of the most critical web risks
  • 2Can lead to data exfiltration, account takeover, or full system compromise
  • 3Required to fix before passing security reviews for enterprise customers

Check your site for Deserialization issues

Run a free scan to see if your domain has any Deserialization-related vulnerabilities or misconfigurations.

Related Terms

Browse Glossary

View all 85 terms

Free Security Scan

See your SSL, headers, CORS, DNS, and email security score in seconds.