Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
You must upgrade to an unaffected version.
Workaround
No workaround given by the vendor.
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Payara Platform
Payara Platform payara Server |
|
| Vendors & Products |
Payara Platform
Payara Platform payara Server |
Wed, 18 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Cross-site scripting in REST Management Interface in Payara Server <4.1.2.191.54, <5.83.0, <6.34.0, <7.2026.1 allows an attacker to mislead the administrator to change the admin password via URL Payload. | |
| Title | Admin Account Takeover via malicious URL payload | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Payara
Published:
Updated: 2026-02-19T09:35:38.796Z
Reserved: 2025-12-09T14:07:13.242Z
Link: CVE-2025-14340
Updated: 2026-02-18T14:09:54.258Z
Status : Awaiting Analysis
Published: 2026-02-18T14:16:00.970
Modified: 2026-02-18T17:51:53.510
Link: CVE-2025-14340
No data.
OpenCVE Enrichment
Updated: 2026-02-19T10:20:07Z