CVE-2025-23367Improper Access Control in Redhat Wildfly

Severity
6.5MEDIUMNVD
EPSS
0.2%
top 57.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 30
Latest updateJan 31

Description

A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to v

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

🔴Vulnerability Details

3
GHSA
WildFly improper RBAC permission2025-01-31
OSV
WildFly improper RBAC permission2025-01-31
CVEList
Org.wildfly.core:wildfly-server: wildfly improper rbac permission2025-01-30

📋Vendor Advisories

1
Red Hat
org.wildfly.core:wildfly-server: Wildfly improper RBAC permission2025-01-30
CVE-2025-23367 — Improper Access Control in Redhat | cvebase