In Progress® Telerik® UI for AJAX versions 2024.4.1114 through 2026.1.421, the RadFilter control is vulnerable to insecure deserialization when restoring filter state if the state is exposed to the client. If an attacker tampers with this state, a server-side remote code execution is possible.
Metrics
Affected Vendors & Products
References
History
Wed, 22 Apr 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Progress® Telerik® UI for AJAX versions 2024.4.1114 through 2026.1.421, the RadFilter control is vulnerable to insecure deserialization when restoring filter state if the state is exposed to the client. If an attacker tampers with this state, a server-side remote code execution is possible. | |
| Title | Deserialization of Untrusted Data Vulnerability in Telerik UI for ASP.NET AJAX | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2026-04-22T07:13:07.933Z
Reserved: 2026-04-09T15:47:27.389Z
Link: CVE-2026-6023
No data.
Status : Received
Published: 2026-04-22T08:16:13.040
Modified: 2026-04-22T08:16:13.040
Link: CVE-2026-6023
No data.
OpenCVE Enrichment
No data.