{"id":78548,"date":"2026-05-17T09:46:20","date_gmt":"2026-05-17T06:16:20","guid":{"rendered":"https:\/\/afaghhosting.net\/blog\/cve-2026-8735-oinone-pamirs-appconfigquery-pamirsparserconfig-java-jsonutils-parsemap-deserialization\/"},"modified":"2026-05-17T09:46:20","modified_gmt":"2026-05-17T06:16:20","slug":"cve-2026-8735-oinone-pamirs-appconfigquery-pamirsparserconfig-java-jsonutils-parsemap-deserialization","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/cve-2026-8735-oinone-pamirs-appconfigquery-pamirsparserconfig-java-jsonutils-parsemap-deserialization\/","title":{"rendered":"CVE-2026-8735 &#8211; Oinone Pamirs appConfigQuery PamirsParserConfig.java JsonUtils.parseMap deserialization"},"content":{"rendered":"<p>CVE ID :CVE-2026-8735<\/p>\n<p>  Published : May 17, 2026, 6:16 a.m. | 41\u00a0minutes ago<\/p>\n<p>  Description :A vulnerability was identified in Oinone Pamirs up to 7.2.0. This affects the function JsonUtils.parseMap of the file PamirsParserConfig.java of the component appConfigQuery Interface. Such manipulation leads to deserialization. The attack can be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.<\/p>\n<p>  Severity: 6.5 | MEDIUM<\/p>\n<p>  Visit the link for more details, such as CVSS details, affected products, timeline, and more&#8230;\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CVE ID :CVE-2026-8735 Published : May 17, 2026, 6:16 a.m. | 41\u00a0minutes ago Description :A vulnerability was identified in Oinone Pamirs up to 7.2.0. This affects the function JsonUtils.parseMap of the file PamirsParserConfig.java of the component appConfigQuery Interface. Such manipulation leads to deserialization. The attack can be launched remotely. The exploit is publicly available and &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-78548","post","type-post","status-publish","format-standard","hentry","category-vulnerability"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78548","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=78548"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/78548\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=78548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=78548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=78548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}