PT-2025-16432 · Oracle+11 · Oracle Graalvm Enterprise Edition+14
Published
2025-04-15
·
Updated
2025-09-08
·
CVE-2025-30698
CVSS v3.1
5.6
Medium
| AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L |
Name of the Vulnerable Software and Affected Versions
Oracle Java SE versions 8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24
Oracle GraalVM for JDK versions 17.0.14, 21.0.6, 24
Oracle GraalVM Enterprise Edition versions 20.3.17, 21.3.13
Description
A difficult to exploit vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition products allows an unauthenticated attacker with network access via multiple protocols to compromise these systems. Successful attacks can result in unauthorized update, insert, or delete access to some accessible data, as well as unauthorized read access to a subset of accessible data and the ability to cause a partial denial of service. This vulnerability applies to Java deployments that load and run untrusted code, such as sandboxed Java Web Start applications or sandboxed Java applets, and rely on the Java sandbox for security.
Recommendations
For Oracle Java SE versions 8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24, update to a version that includes the fix for this issue.
For Oracle GraalVM for JDK versions 17.0.14, 21.0.6, 24, update to a version that includes the fix for this issue.
For Oracle GraalVM Enterprise Edition versions 20.3.17, 21.3.13, update to a version that includes the fix for this issue.
As a temporary workaround, consider restricting access to untrusted code, such as code from the internet, to minimize the risk of exploitation.
Exploit
Fix
DoS
Improper Access Control
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Alt Linux
Almalinux
Astra Linux
Centos
Debian
Java Platform
Linuxmint
Oracle Graalvm Enterprise Edition
Oracle Graalvm For Jdk
Oracle Java Se
Red Hat
Red Os
Rocky Linux
Suse
Ubuntu