CVE-2025-48913

Severity
9.8CRITICAL
EPSS
0.2%
top 58.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 8

Description

If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility. Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDapache/cxf4.0.04.0.9+2
Mavenorg.apache.cxf:cxf-rt-transports-jms4.0.04.0.9+2
CVEListV5apache_software_foundation/apache_cxf4.1.04.1.3+2

🔴Vulnerability Details

3
GHSA
Apache CXF: Untrusted JMS configuration can lead to RCE2025-08-08
OSV
Apache CXF: Untrusted JMS configuration can lead to RCE2025-08-08
CVEList
Apache CXF: Untrusted JMS configuration can lead to RCE2025-08-08

📋Vendor Advisories

1
Red Hat
org.apache.cxf/cxf: CXF JMS Code Execution Vulnerability2025-08-08
CVE-2025-48913 (CRITICAL CVSS 9.8) | If untrusted users are allowed to c | cvebase.io