In Progress® Telerik® UI for AJAX versions 2024.4.1114 through 2026.1.421, the RadFilter control is vulnerable to insecure deserialization when restoring filter state if the state is exposed to the client. If an attacker tampers with this state, a server-side remote code execution is possible.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 22 Apr 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Progress® Telerik® UI for AJAX versions 2024.4.1114 through 2026.1.421, the RadFilter control is vulnerable to insecure deserialization when restoring filter state if the state is exposed to the client. If an attacker tampers with this state, a server-side remote code execution is possible. | |
| Title | Deserialization of Untrusted Data Vulnerability in Telerik UI for ASP.NET AJAX | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2026-04-22T07:13:07.933Z
Reserved: 2026-04-09T15:47:27.389Z
Link: CVE-2026-6023
No data.
Status : Received
Published: 2026-04-22T08:16:13.040
Modified: 2026-04-22T08:16:13.040
Link: CVE-2026-6023
No data.
OpenCVE Enrichment
Updated: 2026-04-22T09:00:09Z
Weaknesses