Impact
An authenticated administrator who configures or tests LDAP connectivity in Sonatype Nexus Repository Manager can trigger unexpected server-side connections to a malicious LDAP server. The vulnerability allows the server to initiate arbitrary outbound connections, potentially exposing internal network resources or facilitating further exploitation. The weakness is classified under CWE-502 for untrusted data serialization and CWE-918 for LDAP injection.
Affected Systems
This flaw affects all Sonatype Nexus Repository Manager 3.x releases from 3.0.0 up to and including 3.91.1. Any installation within this version range that has LDAP integration enabled and where an admin can configure or test LDAP settings is vulnerable.
Risk and Exploitability
The CVSS score is 5.1, indicating a moderate risk, and no EPSS data or KEV listing is available. Exploitation requires authenticated administrative access to the Nexus web interface, after which the attacker can induce the server to contact arbitrary hosts. While no public exploits are documented, the ability to reach internal network machines makes this a significant concern for security teams.
OpenCVE Enrichment