Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23982 | Apache CXF: Untrusted JMS configuration can lead to RCE |
Github GHSA |
GHSA-g4px-6qhm-hqjm | Apache CXF: Untrusted JMS configuration can lead to RCE |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 14 Aug 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:* |
Thu, 14 Aug 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 12 Aug 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache cxf |
|
| Vendors & Products |
Apache
Apache cxf |
Fri, 08 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 08 Aug 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility. Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue. | |
| Title | Apache CXF: Untrusted JMS configuration can lead to RCE | |
| Weaknesses | CWE-20 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-08-13T15:03:45.098Z
Reserved: 2025-05-28T10:04:58.340Z
Link: CVE-2025-48913
Updated: 2025-08-08T13:42:09.955Z
Status : Analyzed
Published: 2025-08-08T10:15:25.663
Modified: 2025-08-14T19:46:03.753
Link: CVE-2025-48913
OpenCVE Enrichment
Updated: 2025-08-12T07:48:05Z
EUVD
Github GHSA