icon

We found results for “

CVE-2025-48795

Good to know:

icon
icon

Date: July 15, 2025

Apache CXF stores large stream based messages as temporary files on the local filesystem. A bug was introduced which means that the entire temporary file is read into memory and then logged. An attacker might be able to exploit this to cause a denial of service attack by causing an out of memory exception. In addition, it is possible to configure CXF to encrypt temporary files to prevent sensitive credentials from being cached unencrypted on the local filesystem, however this bug means that the cached files are written out to logs unencrypted. Users are recommended to upgrade to versions 3.5.11, 3.6.6, 4.0.7 or 4.1.1, which fixes this issue.

Severity Score

Severity Score

Weakness Type (CWE)

Uncontrolled Resource Consumption

CWE-400

Top Fix

icon

Upgrade Version

Upgrade to version org.apache.cxf:cxf-core:3.5.11;org.apache.cxf:cxf-core:3.6.6;org.apache.cxf:cxf-core:4.0.7;org.apache.cxf:cxf-core:4.1.1;org.apache.cxf:cxf-core:3.5.11;org.apache.cxf:cxf-core:3.6.6;org.apache.cxf:cxf-core:4.0.7;https://github.com/apache/cxf.git - cxf-3.5.11;https://github.com/apache/cxf.git - cxf-3.6.6;https://github.com/apache/cxf.git - cxf-4.0.7;https://github.com/apache/cxf.git - cxf-4.1.1

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): LOW

Do you need more information?

Contact Us