vulnerability
Red Hat JBoss EAP: CVE-2020-25638: SQL Injection
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | Oct 1, 2020 | Sep 19, 2024 | Jul 9, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Oct 1, 2020
Added
Sep 19, 2024
Modified
Jul 9, 2025
Description
A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.. A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-89
- CVE-2020-25638
- https://attackerkb.com/topics/CVE-2020-25638
- URL-https://access.redhat.com/security/cve/CVE-2020-25638
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=1881353
- URL-https://access.redhat.com/errata/RHSA-2020:5174
- URL-https://access.redhat.com/errata/RHSA-2020:5175
- URL-https://access.redhat.com/errata/RHSA-2020:5340
- URL-https://access.redhat.com/errata/RHSA-2020:5341
- URL-https://access.redhat.com/errata/RHSA-2020:5342
- URL-https://access.redhat.com/errata/RHSA-2020:5344

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.