A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2512-1 | libhibernate3-java security update |
Debian DSA |
DSA-4908-1 | libhibernate3-java security update |
EUVD |
EUVD-2022-1070 | A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity. |
Github GHSA |
GHSA-j8jw-g6fq-mp7h | SQL injection in hibernate-core |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 25 Jun 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat jboss Enterprise Application Platform Eus
|
|
| CPEs | cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7 | |
| Vendors & Products |
Redhat jboss Enterprise Application Platform Eus
|
Wed, 23 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-04-23T19:47:38.454Z
Reserved: 2020-09-16T00:00:00.000Z
Link: CVE-2020-25638
Updated: 2024-08-04T15:40:35.438Z
Status : Modified
Published: 2020-12-02T15:15:12.377
Modified: 2025-04-23T20:15:19.037
Link: CVE-2020-25638
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA