First published: Wed Mar 12 2025(Updated: )
A security flaw exists in WildFly and JBoss Enterprise Application Platform (EAP) within the Enterprise JavaBeans (EJB) remote invocation mechanism. This vulnerability stems from untrusted data deserialization handled by JBoss Marshalling. This flaw allows an attacker to send a specially crafted serialized object, leading to remote code execution without requiring authentication.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
WildFly | ||
JBoss Enterprise Application Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2251 has been rated as critical due to its potential to allow remote code execution via untrusted data deserialization.
To fix CVE-2025-2251, update WildFly or JBoss EAP to the latest patched version provided by Red Hat.
CVE-2025-2251 affects multiple versions of WildFly prior to the security update addressing this vulnerability.
Yes, exploitation of CVE-2025-2251 could lead to unauthorized access and potential data breaches.
Yes, CVE-2025-2251 is related to a flaw in the Java serialization process used by JBoss Marshalling.