CVE-2026-27830 - c3p0 vulnerable to Remote Code Execution via unsafe deserialization of userOverr...

CVE-2026-27830 - c3p0 vulnerable to Remote Code Execution via unsafe deserialization of userOverr...

CVE ID : CVE-2026-27830 Published : Feb. 26, 2026, 12:45 a.m. | 19 minutes ago Description : c3p0, a JDBC Connection pooling library, is vulnerable to attack via maliciously crafted Java-serialized objects and `javax.naming.Reference` instances. Several c3p0 `ConnectionPoolDataSource` implementations have a property called `userOverridesAsString` which conceptually represents a `Map>`. Prior to v0.12.0, that property was maintained as a hex-encoded serialized object. Any attacker able to reset this property, on an existing `ConnectionPoolDataSource` or via maliciously crafted serialized objects or `javax.naming.Reference` instances could be tailored execute unexpected code on the application's `CLASSPATH`. The danger of this vulnerability was strongly magnified by vulnerabilities in c3p0's main dependency, mchange-commons-java. This library includes code that mirrors early implementations of JNDI functionality, including ungated support for remote `factoryClassLocation` values. Attackers could set c3p0's `userOverridesAsString` hex-encoded serialized objects that include objects

CVE Details

Published
Feb. 26, 2026
Affected Product: Java