Description
Jooby is a web framework for Java and Kotlin. The pac4j io.jooby.internal.pac4j.SessionStoreImpl#get module deserializes untrusted data. This vulnerability is fixed in 2.17.0 (2.x) and 3.7.0 (3.x).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-9309 | Jooby is a web framework for Java and Kotlin. The pac4j io.jooby.internal.pac4j.SessionStoreImpl#get module deserializes untrusted data. This vulnerability is fixed in 2.17.0 (2.x) and 3.7.0 (3.x). |
Github GHSA |
GHSA-7c5v-895v-w4q5 | jooby-pac4j: deserialization of untrusted data |
References
History
Tue, 01 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 31 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jooby is a web framework for Java and Kotlin. The pac4j io.jooby.internal.pac4j.SessionStoreImpl#get module deserializes untrusted data. This vulnerability is fixed in 2.17.0 (2.x) and 3.7.0 (3.x). | |
| Title | jooby-pac4j: deserialization of untrusted data | |
| Weaknesses | CWE-502 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-01T13:53:56.983Z
Reserved: 2025-03-26T15:04:52.627Z
Link: CVE-2025-31129
Updated: 2025-03-31T21:06:59.321Z
Status : Awaiting Analysis
Published: 2025-03-31T19:15:43.023
Modified: 2025-04-01T20:26:22.890
Link: CVE-2025-31129
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA