Impact
A vulnerability exists in the handling of URIs within Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition affecting components such as AWT and JavaFX. When a sandboxed Java Web Start application or applet loads and executes untrusted code from the internet, an unauthenticated attacker can exploit this flaw to create, delete or modify data that the victim user has access to. The vulnerability requires user interaction from a person other than the attacker, but once that occurs it can change the software scope, leading to broader impact across the affected products.
Affected Systems
Affected vendors include Oracle Corporation with products Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK, and Oracle Java SE. The versions impacted are Oracle GraalVM Enterprise Edition 21.3.16; Oracle GraalVM for JDK 17.0.17 and 21.0.9; Oracle Java SE 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, and 25.0.1.
Risk and Exploitability
The CVSS 3.1 base score is 7.4, indicating a high integrity impact. EPSS is less than 1% and the vulnerability is not listed in the CISA KEV catalog, suggesting a lower likelihood of widespread exploitation at this time. The attack vector is likely through network protocols that deliver a Java Web Start or applet payload, requiring the victim to interact with untrusted code. Once the vulnerability is exercised, it can lead to unauthorized data modification within the affected Java environment.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN