Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-48913

Опубликовано: 08 авг. 2025
Источник: redhat
CVSS3: 8.3
EPSS Низкий

Описание

If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility. Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.

A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.

Меры по смягчению последствий

Restrict the allowed protocols for JMS configuration.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 7cxfAffected
Red Hat JBoss Enterprise Application Platform 8cxfAffected
Red Hat JBoss Enterprise Application Platform Expansion PackcxfAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2387221org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability

EPSS

Процентиль: 29%
0.00105
Низкий

8.3 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
9 дней назад

If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility. Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.

github
9 дней назад

Apache CXF: Untrusted JMS configuration can lead to RCE

EPSS

Процентиль: 29%
0.00105
Низкий

8.3 High

CVSS3