Impact
This vulnerability exists in the Oracle Java SE Libraries component. An unauthenticated attacker who can reach the target over the network can introduce malicious Java code into sandboxed Web Start applications or applets. When successfully exploited, the attacker can perform unauthorized update, insert or delete operations on data that the Java application can access. The weakness stems from improper access controls in the sandbox environment that allow manipulation of data privileges, encapsulating issues addressed by CWE‑284 and the newly identified CWE‑250.
Affected Systems
Client deployments of Oracle Java SE 25.0.1 that rely on the Java sandbox to run untrusted code from the internet—specifically sandboxed Web Start applications or applets. Server deployments that execute only trusted, locally installed code are not affected.
Risk and Exploitability
The CVSS 3.1 base score of 3.7 indicates a low‑to‑moderate risk. The EPSS score is less than 1% and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves a network‑based delivery of malicious Java code that bypasses sandbox restrictions; exploitation requires introducing untrusted code via the application. The vulnerability does not provide arbitrary code execution or privilege escalation, so the impact is confined to data integrity of the application’s accessible data only.
OpenCVE Enrichment