vulnerability
Red Hat JBoss EAP: CVE-2025-23367: Improper Access Control
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:N/I:N/A:C) | Jan 30, 2025 | Feb 3, 2025 | Jan 12, 2026 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:C)
Published
Jan 30, 2025
Added
Feb 3, 2025
Modified
Jan 12, 2026
Description
A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server.
The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.. A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server.
The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.
The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.. A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server.
The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-284
- CVE-2025-23367
- https://attackerkb.com/topics/CVE-2025-23367
- URL-https://access.redhat.com/security/cve/CVE-2025-23367
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2337620
- URL-https://github.com/advisories/GHSA-qr6x-62gq-4ccp
- URL-https://access.redhat.com/errata/RHSA-2025:3467
- URL-https://access.redhat.com/errata/RHSA-2025:3989
- URL-https://access.redhat.com/errata/RHSA-2025:3990
- URL-https://access.redhat.com/errata/RHSA-2025:3992
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.