Follow @Openwall on Twitter for new release announcements and other news
[<prev] [day] [month] [year] [list]
Message-ID: <2e559cf5-e82c-a5a8-13fd-c8401cfab3d6@apache.org>
Date: Mon, 14 Jul 2025 09:11:41 +0000
From: Julian Reschke <reschke@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2025-53689: Apache Jackrabbit: XXE vulnerability in
 jackrabbit-spi-commons 

Severity: critical 

Affected versions:

- Apache Jackrabbit (org.apache.jackrabbit:jackrabbit-spi-commons) 2.20.0 before 2.20.17
- Apache Jackrabbit (org.apache.jackrabbit:jackrabbit-spi-commons) 2.22.0 before 2.22.1
- Apache Jackrabbit (org.apache.jackrabbit:jackrabbit-spi-commons) 2.23.0-beta before 2.23.2-beta

Description:

Blind XXE Vulnerabilities in jackrabbit-spi-commons and jackrabbit-core in Apache Jackrabbit < 2.23.2 due to usage of an unsecured document build to load privileges.

Users are recommended to upgrade to versions 2.20.17 (Java 8), 2.22.1 (Java 11) or 2.23.2 (Java 11, beta versions), which fix this issue. Earlier versions (up to 2.20.16) are not supported anymore, thus users should update to the respective supported version.

Credit:

Lars Krapf - Adobe (reporter)
Dylan Pindur - Assetnote (finder)
Adam Kues - Assetnote (finder)

References:

https://jackrabbit.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-53689

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.