CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-31129: jooby-pac4j: deserialization of untrusted data

8.8 CVSS

Description

Jooby is a web framework for Java and Kotlin. The pac4j io.jooby.internal.pac4j.SessionStoreImpl#get module deserializes untrusted data. This vulnerability is fixed in 2.17.0 (2.x) and 3.7.0 (3.x).

Classification

CVE ID: CVE-2025-31129

CVSS Base Severity: HIGH

CVSS Base Score: 8.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Problem Types

CWE-502: Deserialization of Untrusted Data

Affected Products

Vendor: jooby-project

Product: jooby

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 13.02% (scored less or equal to compared to others)

EPSS Date: 2025-04-29 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-31129
https://github.com/jooby-project/jooby/security/advisories/GHSA-7c5v-895v-w4q5
https://github.com/jooby-project/jooby/commit/3e13562cf36d7407813eae464e0f4b598de15692
https://github.com/jooby-project/jooby/blob/v2.x/modules/jooby-pac4j/src/main/java/io/jooby/internal/pac4j/SessionStoreImpl.java#L39-L45
https://github.com/jooby-project/jooby/blob/v3.6.1/modules/jooby-pac4j/src/main/java/io/jooby/internal/pac4j/SessionStoreImpl.java#L77-L84

Timeline