If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility.
Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 14 Aug 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:* |
Thu, 14 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 12 Aug 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache cxf |
|
| Vendors & Products |
Apache
Apache cxf |
Fri, 08 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 08 Aug 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility. Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue. | |
| Title | Apache CXF: Untrusted JMS configuration can lead to RCE | |
| Weaknesses | CWE-20 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published: 2025-08-08T09:21:22.208Z
Updated: 2025-11-04T21:11:08.194Z
Reserved: 2025-05-28T10:04:58.340Z
Link: CVE-2025-48913
Updated: 2025-11-04T21:11:08.194Z
Status : Modified
Published: 2025-08-08T10:15:25.663
Modified: 2025-11-04T22:16:17.657
Link: CVE-2025-48913