Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-32uq-r1e7-3ub4
Vulnerability ID VCID-32uq-r1e7-3ub4
Aliases CVE-2015-7501
GHSA-fjq5-5j5f-mvxh
Summary InvokerTransformer code execution during deserialization This package allows code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (5)
System Score Found at
cvssv3.1 9.8 http://rhn.redhat.com/errata/RHSA-2016-1773.html
generic_textual CRITICAL http://rhn.redhat.com/errata/RHSA-2016-1773.html
cvssv3.1 9.8 https://access.redhat.com/security/vulnerabilities/2059393
generic_textual CRITICAL https://access.redhat.com/security/vulnerabilities/2059393
cvssv3.1 9.8 https://access.redhat.com/solutions/2045023
generic_textual CRITICAL https://access.redhat.com/solutions/2045023
epss 0.71461 https://api.first.org/data/v1/epss?cve=CVE-2015-7501
epss 0.71461 https://api.first.org/data/v1/epss?cve=CVE-2015-7501
epss 0.71461 https://api.first.org/data/v1/epss?cve=CVE-2015-7501
epss 0.71461 https://api.first.org/data/v1/epss?cve=CVE-2015-7501
epss 0.71461 https://api.first.org/data/v1/epss?cve=CVE-2015-7501
epss 0.71461 https://api.first.org/data/v1/epss?cve=CVE-2015-7501
epss 0.71461 https://api.first.org/data/v1/epss?cve=CVE-2015-7501
epss 0.71461 https://api.first.org/data/v1/epss?cve=CVE-2015-7501
epss 0.71461 https://api.first.org/data/v1/epss?cve=CVE-2015-7501
epss 0.71863 https://api.first.org/data/v1/epss?cve=CVE-2015-7501
epss 0.71863 https://api.first.org/data/v1/epss?cve=CVE-2015-7501
cvssv3.1 9.8 https://arxiv.org/pdf/2306.05534.pdf
generic_textual CRITICAL https://arxiv.org/pdf/2306.05534.pdf
cvssv3.1 9.8 https://bugzilla.redhat.com/show_bug.cgi?id=1279330
generic_textual CRITICAL https://bugzilla.redhat.com/show_bug.cgi?id=1279330
cvssv3.1 9.8 https://commons.apache.org/proper/commons-collections/release_4_1.html
generic_textual CRITICAL https://commons.apache.org/proper/commons-collections/release_4_1.html
cvssv3.1 9.8 https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability
generic_textual CRITICAL https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-fjq5-5j5f-mvxh
cvssv3.1 9.8 https://github.com/apache/commons-collections
generic_textual CRITICAL https://github.com/apache/commons-collections
cvssv3.1 9.8 https://github.com/jensdietrich/xshady-release/tree/main/CVE-2015-7501
generic_textual CRITICAL https://github.com/jensdietrich/xshady-release/tree/main/CVE-2015-7501
cvssv3.1 9.8 https://issues.apache.org/jira/browse/COLLECTIONS-580.
generic_textual CRITICAL https://issues.apache.org/jira/browse/COLLECTIONS-580.
cvssv2 10.0 https://nvd.nist.gov/vuln/detail/CVE-2015-7501
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2015-7501
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2015-7501
generic_textual CRITICAL https://nvd.nist.gov/vuln/detail/CVE-2015-7501
cvssv3.1 9.8 https://sourceforge.net/p/collections/code/HEAD/tree
generic_textual CRITICAL https://sourceforge.net/p/collections/code/HEAD/tree
Reference id Reference type URL
http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
http://rhn.redhat.com/errata/RHSA-2015-2500.html
http://rhn.redhat.com/errata/RHSA-2015-2501.html
http://rhn.redhat.com/errata/RHSA-2015-2502.html
http://rhn.redhat.com/errata/RHSA-2015-2514.html
http://rhn.redhat.com/errata/RHSA-2015-2516.html
http://rhn.redhat.com/errata/RHSA-2015-2517.html
http://rhn.redhat.com/errata/RHSA-2015-2521.html
http://rhn.redhat.com/errata/RHSA-2015-2522.html
http://rhn.redhat.com/errata/RHSA-2015-2524.html
http://rhn.redhat.com/errata/RHSA-2015-2670.html
http://rhn.redhat.com/errata/RHSA-2015-2671.html
http://rhn.redhat.com/errata/RHSA-2016-0040.html
http://rhn.redhat.com/errata/RHSA-2016-1773.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7501.json
https://access.redhat.com/security/vulnerabilities/2059393
https://access.redhat.com/solutions/2045023
https://api.first.org/data/v1/epss?cve=CVE-2015-7501
https://arxiv.org/pdf/2306.05534.pdf
https://bugzilla.redhat.com/show_bug.cgi?id=1279330
https://commons.apache.org/proper/commons-collections/release_4_1.html
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7501
https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability
https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
https://github.com/apache/commons-collections
https://issues.apache.org/jira/browse/COLLECTIONS-580.
https://rhn.redhat.com/errata/RHSA-2015-2536.html
https://security.netapp.com/advisory/ntap-20240216-0010/
https://sourceforge.net/p/collections/code/HEAD/tree
https://sourceforge.net/p/collections/code/HEAD/tree/
https://www.oracle.com/security-alerts/cpujul2020.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
http://www.securityfocus.com/bid/78215
http://www.securitytracker.com/id/1034097
http://www.securitytracker.com/id/1037052
http://www.securitytracker.com/id/1037053
http://www.securitytracker.com/id/1037640
cpe:2.3:a:redhat:data_grid:6.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:data_grid:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_a-mq:6.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_a-mq:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_bpm_suite:6.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_bpm_suite:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_data_virtualization:5.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_data_virtualization:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_data_virtualization:6.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_data_virtualization:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_brms_platform:6.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_brms_platform:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_fuse_service_works:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_fuse_service_works:6.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_operations_network:3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_operations_network:3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_portal:6.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_portal:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*
cpe:2.3:a:redhat:subscription_asset_manager:1.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:subscription_asset_manager:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:xpaas:3.0.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:xpaas:3.0.0:*:*:*:*:*:*:*
CVE-2015-7501 https://github.com/jensdietrich/xshady-release/tree/main/CVE-2015-7501
CVE-2015-7501 https://nvd.nist.gov/vuln/detail/CVE-2015-7501
GHSA-fjq5-5j5f-mvxh https://github.com/advisories/GHSA-fjq5-5j5f-mvxh
RHSA-2015:2500 https://access.redhat.com/errata/RHSA-2015:2500
RHSA-2015:2501 https://access.redhat.com/errata/RHSA-2015:2501
RHSA-2015:2502 https://access.redhat.com/errata/RHSA-2015:2502
RHSA-2015:2514 https://access.redhat.com/errata/RHSA-2015:2514
RHSA-2015:2516 https://access.redhat.com/errata/RHSA-2015:2516
RHSA-2015:2517 https://access.redhat.com/errata/RHSA-2015:2517
RHSA-2015:2521 https://access.redhat.com/errata/RHSA-2015:2521
RHSA-2015:2522 https://access.redhat.com/errata/RHSA-2015:2522
RHSA-2015:2523 https://access.redhat.com/errata/RHSA-2015:2523
RHSA-2015:2524 https://access.redhat.com/errata/RHSA-2015:2524
RHSA-2015:2534 https://access.redhat.com/errata/RHSA-2015:2534
RHSA-2015:2535 https://access.redhat.com/errata/RHSA-2015:2535
RHSA-2015:2536 https://access.redhat.com/errata/RHSA-2015:2536
RHSA-2015:2537 https://access.redhat.com/errata/RHSA-2015:2537
RHSA-2015:2538 https://access.redhat.com/errata/RHSA-2015:2538
RHSA-2015:2539 https://access.redhat.com/errata/RHSA-2015:2539
RHSA-2015:2540 https://access.redhat.com/errata/RHSA-2015:2540
RHSA-2015:2541 https://access.redhat.com/errata/RHSA-2015:2541
RHSA-2015:2542 https://access.redhat.com/errata/RHSA-2015:2542
RHSA-2015:2547 https://access.redhat.com/errata/RHSA-2015:2547
RHSA-2015:2548 https://access.redhat.com/errata/RHSA-2015:2548
RHSA-2015:2556 https://access.redhat.com/errata/RHSA-2015:2556
RHSA-2015:2557 https://access.redhat.com/errata/RHSA-2015:2557
RHSA-2015:2559 https://access.redhat.com/errata/RHSA-2015:2559
RHSA-2015:2560 https://access.redhat.com/errata/RHSA-2015:2560
RHSA-2015:2578 https://access.redhat.com/errata/RHSA-2015:2578
RHSA-2015:2579 https://access.redhat.com/errata/RHSA-2015:2579
RHSA-2015:2670 https://access.redhat.com/errata/RHSA-2015:2670
RHSA-2015:2671 https://access.redhat.com/errata/RHSA-2015:2671
RHSA-2016:0040 https://access.redhat.com/errata/RHSA-2016:0040
RHSA-2016:0118 https://access.redhat.com/errata/RHSA-2016:0118
RHSA-2016:1773 https://access.redhat.com/errata/RHSA-2016:1773
RHSA-2020:4274 https://access.redhat.com/errata/RHSA-2020:4274
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at http://rhn.redhat.com/errata/RHSA-2016-1773.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/security/vulnerabilities/2059393
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/solutions/2045023
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://arxiv.org/pdf/2306.05534.pdf
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://bugzilla.redhat.com/show_bug.cgi?id=1279330
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://commons.apache.org/proper/commons-collections/release_4_1.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/apache/commons-collections
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/jensdietrich/xshady-release/tree/main/CVE-2015-7501
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://issues.apache.org/jira/browse/COLLECTIONS-580.
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C Found at https://nvd.nist.gov/vuln/detail/CVE-2015-7501
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2015-7501
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2015-7501
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://sourceforge.net/p/collections/code/HEAD/tree
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.98714
EPSS Score 0.71461
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:47:28.638747+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/commons-collections/commons-collections/CVE-2015-7501.yml 38.0.0