Redhat Wildfly vulnerabilities

17 known vulnerabilities affecting redhat/wildfly.

Total CVEs
17
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH4MEDIUM10LOW1

Vulnerabilities

Page 1 of 1
CVE-2025-23367MEDIUMCVSS 6.5fixed in 27.0.1v28.0.02025-01-30
CVE-2025-23367 [MEDIUM] CWE-284 CVE-2025-23367: A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions
nvd
CVE-2022-1278HIGHCVSS 7.5fixed in 27.0.02022-09-13
CVE-2022-1278 [HIGH] CWE-1188 CVE-2022-1278: A flaw was found in WildFly, where an attacker can see deployment names, endpoints, and any other da A flaw was found in WildFly, where an attacker can see deployment names, endpoints, and any other data the trace payload may contain.
nvd
CVE-2021-3644LOWCVSS 3.3v16.0.0v17.0.02022-08-26
CVE-2021-3644 [LOW] CWE-200 CVE-2021-3644: A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single a A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was stored in the vault. The highest thr
nvd
CVE-2022-0866MEDIUMCVSS 5.3≥ 11.0.0, < 26.1.1v27.0.02022-05-10
CVE-2022-0866 [MEDIUM] CWE-863 CVE-2022-0866: This is a concurrency issue that can result in the wrong caller principal being returned from the se This is a concurrency issue that can result in the wrong caller principal being returned from the session context of an EJB that is configured with a RunAs principal. In particular, the org.jboss.as.ejb3.component.EJBComponent class has an incomingRunAsIdentity field. This field is used by the org.jboss.as.ejb3.security.RunAsPrincipalInterceptor to ke
nvd
CVE-2021-3503MEDIUMCVSS 4.3fixed in 23.0.12022-04-18
CVE-2021-3503 [MEDIUM] CWE-200 CVE-2021-3503: A flaw was found in Wildfly where insufficient RBAC restrictions may lead to expose metrics data. Th A flaw was found in Wildfly where insufficient RBAC restrictions may lead to expose metrics data. The highest threat from this vulnerability is to the confidentiality.
nvd
CVE-2020-1719MEDIUMCVSS 5.4fixed in 20.0.02021-06-07
CVE-2020-1719 [MEDIUM] CWE-270 CVE-2020-1719: A flaw was found in wildfly. The EJBContext principle is not popped back after invoking another EJB A flaw was found in wildfly. The EJBContext principle is not popped back after invoking another EJB using a different Security Domain. The highest threat from this vulnerability is to data confidentiality and integrity. Versions before wildfly 20.0.0.Final are affected.
nvd
CVE-2021-3536MEDIUMCVSS 4.8fixed in 23.0.22021-05-20
CVE-2021-3536 [MEDIUM] CWE-79 CVE-2021-3536: A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in domain mode A flaw was found in Wildfly in versions before 23.0.2.Final while creating a new role in domain mode via the admin console, it is possible to add a payload in the name field, leading to XSS. This affects Confidentiality and Integrity.
nvd
CVE-2020-27822MEDIUMCVSS 5.9v19.0.0v19.1.0+3 more2020-12-08
CVE-2020-27822 [MEDIUM] CWE-401 CVE-2020-27822: A flaw was found in Wildfly affecting versions 19.0.0.Final, 19.1.0.Final, 20.0.0.Final, 20.0.1.Fina A flaw was found in Wildfly affecting versions 19.0.0.Final, 19.1.0.Final, 20.0.0.Final, 20.0.1.Final, and 21.0.0.Final. When an application uses the OpenTracing API's java-interceptors, there is a possibility of a memory leak. This flaw allows an attacker to impact the availability of the server. The highest threat from this vulnerability is to sys
nvd
CVE-2020-25640MEDIUMCVSS 5.3fixed in 21.0.02020-11-24
CVE-2020-25640 [MEDIUM] CWE-209 CVE-2020-25640: A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS pas A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.
nvd
CVE-2020-25689MEDIUMCVSS 6.5≤ 21.0.02020-11-02
CVE-2020-25689 [MEDIUM] CWE-401 CVE-2020-25689: A memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where host-controller tr A memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where host-controller tries to reconnect in a loop, generating new connections which are not properly closed while not able to connect to domain-controller. This flaw allows an attacker to cause an Out of memory (OOM) issue, leading to a denial of service. The highest threat
nvd
CVE-2020-10718HIGHCVSS 7.5fixed in 13.0.02020-09-16
CVE-2020-10718 [HIGH] CVE-2020-10718: A flaw was found in Wildfly before wildfly-embedded-13.0.0.Final, where the embedded managed process A flaw was found in Wildfly before wildfly-embedded-13.0.0.Final, where the embedded managed process API has an exposed setting of the Thread Context Classloader (TCCL). This setting is exposed as a public method, which can bypass the security manager. The highest threat from this vulnerability is to confidentiality.
nvd
CVE-2020-10740HIGHCVSS 7.5fixed in 20.0.02020-06-22
CVE-2020-10740 [MEDIUM] CWE-502 CVE-2020-10740: A vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization A vulnerability was found in Wildfly in versions before 20.0.0.Final, where a remote deserialization attack is possible in the Enterprise Application Beans(EJB) due to lack of validation/filtering capabilities in wildfly.
nvd
CVE-2019-14887CRITICALCVSS 9.1v7.2.0v7.2.3+1 more2020-03-16
CVE-2019-14887 [CRITICAL] CWE-757 CVE-2019-14887: A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' val A flaw was found when an OpenSSL security provider is used with Wildfly, the 'enabled-protocols' value in the Wildfly configuration isn't honored. An attacker could target the traffic sent from Wildfly and downgrade the connection to a weaker version of TLS, potentially breaking the encryption. This could lead to a leak of the data being passed ov
nvd
CVE-2019-3894HIGHCVSS 8.8≥ 11.0.0, ≤ 16.0.02019-05-03
CVE-2019-3894 [HIGH] CWE-358 CVE-2019-3894: It was discovered that the ElytronManagedThread in Wildfly's Elytron subsystem in versions from 11 t It was discovered that the ElytronManagedThread in Wildfly's Elytron subsystem in versions from 11 to 16 stores a SecurityIdentity to run the thread as. These threads do not necessarily terminate if the keep alive time has not expired. This could allow a shared thread to use the wrong security identity when executing.
nvd
CVE-2019-3805MEDIUMCVSS 4.7≤ 16.0.02019-05-03
CVE-2019-3805 [MEDIUM] CWE-364 CVE-2019-3805: A flaw was discovered in wildfly versions up to 16.0.0.Final that would allow local users who are ab A flaw was discovered in wildfly versions up to 16.0.0.Final that would allow local users who are able to execute init.d script to terminate arbitrary processes on the system. An attacker could exploit this by modifying the PID file in /var/run/jboss-eap/ allowing the init.d script to terminate any process as root.
nvd
CVE-2018-14627MEDIUMCVSS 5.9fixed in 14.0.02018-09-04
CVE-2018-14627 [MEDIUM] CWE-319 CVE-2018-14627: The IIOP OpenJDK Subsystem in WildFly before version 14.0.0 does not honour configuration when SSL t The IIOP OpenJDK Subsystem in WildFly before version 14.0.0 does not honour configuration when SSL transport is required. Servers before this version that are configured with the following setting allow clients to create plaintext connections:
nvd
CVE-2018-10683CRITICALCVSS 9.8v10.1.22018-05-09
CVE-2018-10683 [CRITICAL] CWE-287 CVE-2018-10683: An issue was discovered in WildFly 10.1.2.Final. In the case of a default installation without a sec An issue was discovered in WildFly 10.1.2.Final. In the case of a default installation without a security realm reference, an attacker can successfully access the server without authentication. NOTE: the Security Realms documentation in the product's Admin Guide indicates that "without a security realm reference" implies "effectively unsecured." T
nvd