cve-2025-26865
Vulnerability from cvelistv5
Published
2025-03-10 14:01
Modified
2025-03-11 19:26
Severity ?
EPSS score ?
Summary
Apache OFBiz: Server-Side Template Injection affecting the ecommerce plugin leading to possible RCE
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache OFBiz |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-03-10T14:03:22.308Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/03/07/1" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-26865", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-11T19:25:54.489016Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-11T19:26:51.972Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache OFBiz", "vendor": "Apache Software Foundation", "versions": [ { "lessThan": "18.12.18", "status": "affected", "version": "18.12.17", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Matei \"Mal\" Badanoiu" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eImproper Neutralization of Special Elements Used in a Template Engine vulnerability in Apache OFBiz.\u003c/p\u003e\u003cp\u003eThis issue affects Apache OFBiz: from 18.12.17 before 18.12.18.\u0026nbsp;\u0026nbsp;\u003c/p\u003eIt\u0027s a regression between 18.12.17 and 18.12.18.\u003cbr\u003eIn case you use something like that, which is not recommended!\u003cbr\u003eFor security, only official releases should be used.\u003cbr\u003e\u003cbr\u003eIn other words, if you use 18.12.17 you are still safe.\u003cbr\u003eThe version 18.12.17 is not a affected.\u003cbr\u003eBut something between 18.12.17 and 18.12.18 is.\u003cbr\u003e\u003cbr\u003eIn that case, users are recommended to upgrade to version 18.12.18, which fixes the issue.\u003cbr\u003e" } ], "value": "Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Apache OFBiz.\n\nThis issue affects Apache OFBiz: from 18.12.17 before 18.12.18.\u00a0\u00a0\n\nIt\u0027s a regression between 18.12.17 and 18.12.18.\nIn case you use something like that, which is not recommended!\nFor security, only official releases should be used.\n\nIn other words, if you use 18.12.17 you are still safe.\nThe version 18.12.17 is not a affected.\nBut something between 18.12.17 and 18.12.18 is.\n\nIn that case, users are recommended to upgrade to version 18.12.18, which fixes the issue." } ], "metrics": [ { "other": { "content": { "text": "important" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1336", "description": "CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-10T14:01:06.952Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "mitigation", "release-notes", "product" ], "url": "https://ofbiz.apache.org/download.html" }, { "tags": [ "patch" ], "url": "https://ofbiz.apache.org/security.html" }, { "tags": [ "issue-tracking" ], "url": "https://issues.apache.org/jira/browse/OFBIZ-12594" }, { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/prb48ztk01bflyyjbl6p56wlcc1n5sz7" } ], "source": { "discovery": "EXTERNAL" }, "title": "Apache OFBiz: Server-Side Template Injection affecting the ecommerce plugin leading to possible RCE", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2025-26865", "datePublished": "2025-03-10T14:01:06.952Z", "dateReserved": "2025-02-17T09:53:13.390Z", "dateUpdated": "2025-03-11T19:26:51.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-26865\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2025-03-10T14:15:25.220\",\"lastModified\":\"2025-03-11T20:15:17.917\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Apache OFBiz.\\n\\nThis issue affects Apache OFBiz: from 18.12.17 before 18.12.18.\u00a0\u00a0\\n\\nIt\u0027s a regression between 18.12.17 and 18.12.18.\\nIn case you use something like that, which is not recommended!\\nFor security, only official releases should be used.\\n\\nIn other words, if you use 18.12.17 you are still safe.\\nThe version 18.12.17 is not a affected.\\nBut something between 18.12.17 and 18.12.18 is.\\n\\nIn that case, users are recommended to upgrade to version 18.12.18, which fixes the issue.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de neutralizaci\u00f3n inadecuada de elementos especiales utilizados en un motor de plantillas en Apache OFBiz. Este problema afecta a Apache OFBiz: desde la versi\u00f3n 18.12.17 hasta la 18.12.18. Es una regresi\u00f3n entre la 18.12.17 y la 18.12.18. En caso de que utilices algo as\u00ed, \u00a1lo cual no se recomienda! Por seguridad, solo se deben utilizar las versiones oficiales. En otras palabras, si utilizas la 18.12.17, a\u00fan est\u00e1s a salvo. La versi\u00f3n 18.12.17 no est\u00e1 afectada. Pero algo entre la 18.12.17 y la 18.12.18 s\u00ed lo est\u00e1. En ese caso, se recomienda a los usuarios que actualicen a la versi\u00f3n 18.12.18, que soluciona el problema.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":3.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.9,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1336\"}]}],\"references\":[{\"url\":\"https://issues.apache.org/jira/browse/OFBIZ-12594\",\"source\":\"security@apache.org\"},{\"url\":\"https://lists.apache.org/thread/prb48ztk01bflyyjbl6p56wlcc1n5sz7\",\"source\":\"security@apache.org\"},{\"url\":\"https://ofbiz.apache.org/download.html\",\"source\":\"security@apache.org\"},{\"url\":\"https://ofbiz.apache.org/security.html\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/03/07/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.