There is insufficient checking of user queries in Apache Jena versions 4.7.0 and earlier, when invoking custom scripts. It allows a remote user to execute arbitrary javascript via a SPARQL query.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-xgh5-gwq5-rpx8 Arbitrary javascript injection in Apache Jena
Fixes

Solution

No solution given by the vendor.


Workaround

Users not using custom scripted functions are advised to run Java17 or later with no script engine added to the deployment.

History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00849}

epss

{'score': 0.00436}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-02-13T16:44:03.940Z

Reserved: 2023-01-05T14:41:04.515Z

Link: CVE-2023-22665

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-04-25T07:15:08.137

Modified: 2024-11-21T07:45:09.793

Link: CVE-2023-22665

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.