vulnerability
Red Hat JBoss EAP: CVE-2025-48913: Improper Input Validation
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:S/C:C/I:C/A:P) | Aug 8, 2025 | Aug 15, 2025 | Oct 3, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:S/C:C/I:C/A:P)
Published
Aug 8, 2025
Added
Aug 15, 2025
Modified
Oct 3, 2025
Description
If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility.
Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.. A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.
Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.. A flaw was found in org.apache.cxf/cxf, where untrusted users can configure JMS to allow the specification of RMI or LDAP URLs, possibly leading to code execution. This vulnerability allows an attacker to provide malicious protocol URLs during JMS configuration.
Solution
red-hat-jboss-eap-upgrade-latest
References
- CWE-20
- CVE-2025-48913
- https://attackerkb.com/topics/CVE-2025-48913
- URL-https://access.redhat.com/security/cve/CVE-2025-48913
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=2387221
- URL-https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83
- URL-https://access.redhat.com/errata/RHSA-2025:17298
- URL-https://access.redhat.com/errata/RHSA-2025:17299
- URL-https://access.redhat.com/errata/RHSA-2025:17317
- URL-https://access.redhat.com/errata/RHSA-2025:17318
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.