Bio-Formats performs unsafe Java deserialization of attacker-controlled memoization cache files (.bfmemo) during image processing
Moderate severity
GitHub Reviewed
Published
Jan 7, 2026
to the GitHub Advisory Database
•
Updated Jan 8, 2026
Description
Published by the National Vulnerability Database
Jan 7, 2026
Published to the GitHub Advisory Database
Jan 7, 2026
Last updated
Jan 8, 2026
Reviewed
Jan 8, 2026
Bio-Formats versions up to and including 8.3.0 perform unsafe Java deserialization of attacker-controlled memoization cache files (.bfmemo) during image processing. The loci.formats.Memoizer class automatically loads and deserializes memo files associated with images without validation, integrity checks, or trust enforcement. An attacker who can supply a crafted .bfmemo file alongside an image can trigger deserialization of untrusted data, which may result in denial of service, logic manipulation, or potentially remote code execution in environments where suitable gadget chains are present on the classpath.
References