First published: Tue Jan 14 2025(Updated: )
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-qr6x-62gq-4ccp. This link is maintained to preserve external references. ## Original Description A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.wildfly.core:wildfly-server | =28.0.0.Beta1 | 28.0.0.Beta2 |
maven/org.wildfly.core:wildfly-server | <27.0.1.Final | 27.0.1.Final |
maven/org.wildfly:wildfly-server | <=27.0.0.Final |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-23367 is classified as moderate.
To fix CVE-2025-23367, upgrade Wildfly Server to version 28.0.0.Beta2 or 27.0.1.Final.
CVE-2025-23367 may lead to unauthorized access due to flaws in the Role Based Access Control (RBAC) provider.
CVE-2025-23367 affects Wildfly Server versions prior to 27.0.1.Final and 28.0.0.Beta2.
Yes, CVE-2025-23367 has been withdrawn as it is a duplicate of GHSA-qr6x-62gq-4ccp.