Security for everyone

CVE-2013-7285 Scanner

Detects 'Remote Code Execution (RCE)' vulnerability in XStream affects v. up to 1.4.6 and version 1.4.10.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4



XStream is an open-source Java library for serializing objects to and from XML and other supported formats. It is widely used in software development to simplify the process of converting objects into a serialized representation that can be stored or transmitted over a network. XStream is designed to be easy to use and highly customizable, making it a popular choice among developers for a wide range of applications.

The CVE-2013-7285 vulnerability is a remote code execution vulnerability that was discovered in XStream API versions up to 1.4.6 and version 1.4.10. The vulnerability occurs when the security framework has not been initialized, allowing a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format, such as JSON. This vulnerability can be exploited by attackers to perform malicious activities, such as gaining unauthorized access to sensitive data, taking control of the affected system, or even launching attacks against other systems.

When exploited, this vulnerability can lead to serious consequences, such as data theft, data destruction, loss of revenue, and damage to reputation. Attackers may use the vulnerability to inject malicious code into the affected system, which in turn could lead to leakage of sensitive data or loss of control over the system. The exploitation of the vulnerability can also be used to launch further attacks against other systems and networks, resulting in a ripple effect with potentially devastating consequences.

Thanks to the pro features of the platform, those who read this article can easily and quickly learn about vulnerabilities in their digital assets. provides a comprehensive suite of tools and resources to help organizations identify, manage, and mitigate security risks, from vulnerability scanning and penetration testing to risk assessment and compliance management. By partnering with, organizations can ensure that their digital assets are secure, and that they are well prepared to respond to security threats and incidents.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture