 
                        We found results for “”
CVE-2025-48913
Good to know:
 
                                    Date: August 8, 2025
If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility. Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Improper Input Validation
CWE-20Top Fix
 
                                    Upgrade Version
Upgrade to version org.apache.cxf:cxf-rt-transports-jms:3.6.8;org.apache.cxf:cxf-rt-transports-jms:4.0.9;org.apache.cxf:cxf-rt-transports-jms:4.1.3
CVSS v3.1
| Base Score: |  | 
|---|---|
| Attack Vector (AV): | NETWORK | 
| Attack Complexity (AC): | LOW | 
| Privileges Required (PR): | NONE | 
| User Interaction (UI): | NONE | 
| Scope (S): | UNCHANGED | 
| Confidentiality (C): | HIGH | 
| Integrity (I): | HIGH | 
| Availability (A): | HIGH | 
 Vulnerabilities
                        Vulnerabilities
                 Projects
                        Projects
                 Vulnerability Disclosure
                        Vulnerability Disclosure
                 About Us
                    About Us
                 Contact Us
                    Contact Us
                

