NEXTGUARD
Pricing
Scan free
NextGuard

Vulnerability monitoring for modern software teams.

Product
  • Features
  • Pricing
  • Compare
  • Plugins
  • CVE Database
  • vulnerabilities
  • About
  • How we work
  • Security
  • Guide
  • Blog
  • Support
Platforms
  • WordPress
  • Drupal
  • Joomla
  • PrestaShop
  • Magento
  • Laravel
vs Competitors
  • vs Patchstack
  • vs Snyk
  • vs Socket.dev
  • vs Dependabot
  • vs WPScan
Legal
  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Refund Policy
SSL/TLS Secured
Secure Payments
GDPR Compliant
Secure Platform
AI-Powered Analysis

© 2026 NextGuard. All rights reserved.

Payments securely processed

NEXTGUARD
Pricing
Scan free
CVE-2025-33042
MEDIUMCVE-2025-33042

CVE-2025-33042: Code Injection in Apache Avro Compiler

Platform

java

Component

org.apache.avro:avro-compiler

Fixed in

1.11.5

1.12.1

NextGuard

Vulnerability monitoring for modern software teams.

Product
  • Features
  • Pricing
  • Compare
  • Plugins
  • CVE Database
  • vulnerabilities
  • About
  • How we work
  • Security
  • Guide
  • Blog
  • Support
Platforms
  • WordPress
  • Drupal
  • Joomla
  • PrestaShop
  • Magento
  • Laravel
vs Competitors
  • vs Patchstack
  • vs Snyk
  • vs Socket.dev
  • vs Dependabot
  • vs WPScan
Legal
  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Refund Policy
SSL/TLS Secured
Secure Payments
GDPR Compliant
Secure Platform
AI-Powered Analysis

© 2026 NextGuard. All rights reserved.

Payments securely processed

1.12.1

1.11.5

AI Confidence: highNVDEPSS 0.1%Reviewed: May 2026
View on NVD
Save

CVE-2025-33042 describes a Code Injection vulnerability discovered in the Apache Avro Java SDK. This flaw allows attackers to inject malicious code when generating records from untrusted Avro schemas, potentially leading to arbitrary code execution. The vulnerability impacts versions up to and including 1.12.0. A fix is available in version 1.12.1 and 1.11.5.

Impact and Attack Scenarios

An attacker exploiting this vulnerability could craft a malicious Avro schema that, when processed by the Avro compiler, results in the execution of arbitrary code on the system. This could lead to complete system compromise, data exfiltration, or denial of service. The impact is particularly severe in environments where Avro schemas are sourced from untrusted origins, such as external APIs or user-provided configurations. The ability to inject code directly into the generated Java code makes this a high-risk vulnerability, similar in potential impact to other code injection flaws.

Exploitation Context

CVE-2025-33042 was publicly disclosed on 2026-02-13. The EPSS score is pending evaluation. Currently, there are no publicly known proof-of-concept exploits. It is listed on the NVD and CISA advisories.

Threat Intelligence

Exploit Status

Proof of ConceptUnknown
CISA KEVNO
Reports2 threat reports

EPSS

0.07% (22% percentile)

Affected Software

Componentorg.apache.avro:avro-compiler
Vendorosv
Affected rangeFixed in
0 – 1.11.41.11.5
1.12.0 – 1.12.01.12.1
1.12.01.12.1
—1.11.5

Weakness Classification (CWE)

CWE-94

Timeline

  1. Reserved2025-04-15
  2. Published2026-02-13
  3. Modified2026-02-19
  4. EPSS updated2026-03-23

Mitigation and Workarounds

The primary mitigation for CVE-2025-33042 is to upgrade to a patched version of the Apache Avro Java SDK. Upgrade to version 1.12.1 or 1.11.5. If upgrading immediately is not possible, consider implementing input validation on Avro schemas to prevent the processing of potentially malicious content. While not a complete solution, this can reduce the attack surface. Review any existing schema validation rules and strengthen them to reject schemas containing suspicious patterns. After upgrading, confirm the fix by attempting to compile a known malicious schema and verifying that it fails to generate executable code.

How to fix

Upgrade the version of Apache Avro Java SDK to version 1.11.5 or later, or to version 1.12.1 or later. This will correct the code injection vulnerability when generating specific records from untrusted Avro schemas. Download the latest version from the Maven repository.

CVE Security Newsletter

Vulnerability analysis and critical alerts directly to your inbox.

Frequently asked questions

What is CVE-2025-33042 — Code Injection in Apache Avro Compiler?

CVE-2025-33042 is a Code Injection vulnerability in Apache Avro Compiler affecting versions up to 1.12.0. It allows attackers to inject malicious code via crafted Avro schemas.

Am I affected by CVE-2025-33042 in Apache Avro Compiler?

You are affected if you are using Apache Avro Compiler versions 1.12.0 or earlier. Check your dependencies and upgrade if necessary.

How do I fix CVE-2025-33042 in Apache Avro Compiler?

Upgrade to version 1.12.1 or 1.11.5. If immediate upgrade is not possible, implement schema validation to prevent processing malicious content.

Is CVE-2025-33042 being actively exploited?

As of the current date, there are no publicly known active exploits for CVE-2025-33042.

Where can I find the official Apache Avro advisory for CVE-2025-33042?

Refer to the Apache Avro project website and security mailing lists for the official advisory and updates: https://avro.apache.org/

NextGuard
Vulnerabilities

Is your project affected?

Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.

Scan freeSearch CVEs
Java / Maven

Detect this CVE in your project

Upload your pom.xml file and we'll tell you instantly if you're affected.

Upload pom.xmlSupported formats: pom.xml · build.gradle