If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility.
Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache cxf |
|
Vendors & Products |
Apache
Apache cxf |
Fri, 08 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Fri, 08 Aug 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility. Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue. | |
Title | Apache CXF: Untrusted JMS configuration can lead to RCE | |
Weaknesses | CWE-20 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-08-08T09:21:22.208Z
Updated: 2025-08-08T13:42:37.930Z
Reserved: 2025-05-28T10:04:58.340Z
Link: CVE-2025-48913

Updated: 2025-08-08T13:42:09.955Z

Status : Awaiting Analysis
Published: 2025-08-08T10:15:25.663
Modified: 2025-08-08T20:30:18.180
Link: CVE-2025-48913

No data.