This vulnerability occurs when a class containing sensitive information, such as credentials or personal data, is left serializable by default. Because the class does not explicitly prevent serialization, its internal data can be accessed and extracted by other parts of the application or external processes.
When a class implements Serializable without safeguards, it effectively becomes an open book. The sensitive fields within it cannot be truly hidden; any other class with serialization access can reconstruct the object and read its private data, bypassing intended access controls. This exposes critical information that should remain protected. To prevent this, developers should explicitly deny serialization for sensitive classes by marking them as 'transient' or overriding serialization methods. While SAST tools can detect this pattern, Plexicus uses AI to not only identify the flaw but also generate the specific code fix—such as adding a custom `readObject` method—saving significant manual remediation time across your codebase.
Impact: Read Application Data
an attacker can write out the class to a byte stream, then extract the important data from it.
javaHigh