Impact
The vulnerability resides in the JGSS component of Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition. It allows an unauthenticated attacker with network access via multiple protocols to compromise sandboxed Java Web Start applications or applets that load untrusted code. Successful exploitation can grant unauthorized access to critical data or complete access to all accessible data in the affected Java deployment, though it requires human interaction with a user different from the attacker. The weakness is related to CWE-285, CWE-306, and CWE-319.
Affected Systems
Affected products are Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition. The vulnerable versions include Java SE 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26, GraalVM for JDK 17.0.18 and 21.0.10, and GraalVM Enterprise Edition 21.3.17.
Risk and Exploitability
The CVSS v3.1 base score is 5.3, indicating moderate severity, affecting confidentiality only. The EPSS score is currently not available and the vulnerability is not listed in the CISA KEV catalog. Because the vulnerability requires network exposure and human interaction, it is unlikely to be exploited automatically, but valid exploitation may occur if a user runs untrusted Java content. Attackers would typically target client‑side applications that rely on the Java sandbox for security rather than server deployments that run only trusted code.
OpenCVE Enrichment