Vulnerability Description
If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility. Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Cxf | < 3.6.8 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2025/08/07/2
FAQ
What is CVE-2025-48913?
CVE-2025-48913 is a vulnerability with a CVSS score of 9.8 (CRITICAL). If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to rej...
How severe is CVE-2025-48913?
CVE-2025-48913 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-48913?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Cxf.