PT-2025-36440 · Apache · Apache Jackrabbit

James John

·

Published

2025-09-08

·

Updated

2025-09-08

·

CVE-2025-58782

CVSS v3.1
6.5
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Name of the Vulnerable Software and Affected Versions:

Apache Jackrabbit Core versions 1.0.0 through 2.22.1

Apache Jackrabbit JCR Commons versions 1.0.0 through 2.22.1

Description:

This issue involves the deserialization of untrusted data in Apache Jackrabbit Core and Apache Jackrabbit JCR Commons. Deployments accepting JNDI URIs for JCR lookup from untrusted users are susceptible to malicious JNDI reference injection, potentially leading to arbitrary code execution.

Recommendations:

Upgrade Apache Jackrabbit Core to version 2.22.2.

Upgrade Apache Jackrabbit JCR Commons to version 2.22.2.

In version 2.22.2 and later, JCR lookup through JNDI is disabled by default. If this feature is required, enable it explicitly and carefully review the use of JNDI URIs for JCR lookup.

Fix

RCE

Deserialization of Untrusted Data

Weakness Enumeration

Related Identifiers

CVE-2025-58782

Affected Products

Apache Jackrabbit