Executive Summary
Open Access Management (OpenAM) is an access management solution. Prior to 16.0.6, OpenIdentityPlatform OpenAM is vulnerable to pre-authentication Remote Code Execution (RCE) via unsafe Java deserialization of the jato.clientSession HTTP parameter. This bypasses the WhitelistObjectInputStream mitigation that was applied to the jato.pageSession parameter after CVE-2021-35464. An unauthenticated attacker can achieve arbitrary command execution on the server by sending a crafted serialized Java object as the jato.clientSession GET/POST parameter to any JATO ViewBean endpoint whose JSP contains
Why It Matters
CVE-2026-33439 is rated CRITICAL severity, requiring immediate attention from security teams.
CVSS Base Score: 9.8/10
EPSS (Exploit Prediction): 0.1% probability of exploitation in the next 30 days.
Affected Technologies
Vendors: openidentityplatform
Products: openam
🛡️What Defenders Should Check
Use Vulnios to continuously monitor your exposure to CVE-2026-33439 and similar vulnerabilities.
References & Sources
AI Security Advisor
Powered by Gemini
Get AI-powered security recommendations tailored to this specific threat — including risk assessment, detection guidance, MITRE ATT&CK mapping, and actionable remediation steps.
Affected Products
Sources
Protect Your Organization
Monitor CVEs, scan for vulnerabilities, and get real-time threat alerts — all in one platform.
Get instant alerts on Telegram
Join our public channel for real-time critical CVE alerts.
Follow @vulnios