There is insufficient checking of user queries in Apache Jena versions 4.7.0 and earlier, when invoking custom scripts. It allows a remote user to execute arbitrary javascript via a SPARQL query.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-xgh5-gwq5-rpx8 | Arbitrary javascript injection in Apache Jena |
Fixes
Solution
No solution given by the vendor.
Workaround
Users not using custom scripted functions are advised to run Java17 or later with no script engine added to the deployment.
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T16:44:03.940Z
Reserved: 2023-01-05T14:41:04.515Z
Link: CVE-2023-22665
No data.
Status : Modified
Published: 2023-04-25T07:15:08.137
Modified: 2024-11-21T07:45:09.793
Link: CVE-2023-22665
No data.
OpenCVE Enrichment
No data.
Github GHSA