Cyber Posture

CVE-2026-22187

HighPublic PoC

Published: 07 January 2026

Published
07 January 2026
Modified
26 February 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0042 61.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22187 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Openmicroscopy Bio-Formats. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked in the top 38.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely remediation of the unsafe deserialization flaw in Bio-Formats by applying patches to versions up to 8.3.0.

prevent

Mandates validation of untrusted inputs like attacker-supplied .bfmemo files prior to deserialization to block exploitation.

prevent

Enforces integrity checks on memoization cache files (.bfmemo) to prevent processing tampered or untrusted serialized data.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Unsafe deserialization of attacker-supplied .bfmemo files directly enables client-side RCE when a user opens a paired image file (T1204.002 Malicious File), matching Exploitation for Client Execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Bio-Formats versions up to and including 8.3.0 perform unsafe Java deserialization of attacker-controlled memoization cache files (.bfmemo) during image processing. The loci.formats.Memoizer class automatically loads and deserializes memo files associated with images without validation, integrity checks, or trust enforcement. An…

more

attacker who can supply a crafted .bfmemo file alongside an image can trigger deserialization of untrusted data, which may result in denial of service, logic manipulation, or potentially remote code execution in environments where suitable gadget chains are present on the classpath.

Deeper analysisAI

CVE-2026-22187 is an unsafe Java deserialization vulnerability in Bio-Formats versions up to and including 8.3.0. The issue resides in the loci.formats.Memoizer class, which automatically loads and deserializes memoization cache files (.bfmemo) associated with images during processing, without performing validation, integrity checks, or trust enforcement. This flaw, classified under CWE-502, enables deserialization of untrusted data when a crafted .bfmemo file is present alongside an image file.

An attacker can exploit this vulnerability by supplying a malicious .bfmemo file paired with a legitimate image. Exploitation requires local access (AV:L) with low attack complexity (AC:L), no privileges (PR:N), and user interaction (UI:R), such as a user opening the image in an affected Bio-Formats application. Successful deserialization may lead to denial of service, logic manipulation, or remote code execution in environments where suitable gadget chains exist on the classpath. The vulnerability has a CVSS v3.1 base score of 7.8 (S:U/C:H/I:H/A:H), reflecting high impacts on confidentiality, integrity, and availability.

Mitigation guidance is available in related advisories, including the Open Microscopy Environment Bio-Formats documentation at https://docs.openmicroscopy.org/bio-formats/, the Full Disclosure mailing list posting at https://seclists.org/fulldisclosure/2026/Jan/7, and VulnCheck's advisory at https://www.vulncheck.com/advisories/bio-formats-memoizer-unsafe-deserialization-via-bfmemo-cache-files. Security practitioners should consult these resources for patching instructions and workarounds specific to affected versions.

Details

CWE(s)

Affected Products

openmicroscopy
bio-formats
≤ 8.3.0

CVEs Like This One

CVE-2026-22186Same product: Openmicroscopy Bio-Formats
CVE-2025-60038Shared CWE-502
CVE-2026-24141Shared CWE-502
CVE-2025-33253Shared CWE-502
CVE-2025-60037Shared CWE-502
CVE-2026-24151Shared CWE-502
CVE-2024-12742Shared CWE-502
CVE-2025-33248Shared CWE-502
CVE-2025-60036Shared CWE-502
CVE-2026-26208Shared CWE-502

References