CVE-2025-31129 – Jooby Deserialization Vulnerability

The following table lists the changes that have been made to the
CVE-2025-31129 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Mar. 31, 2025

    Action Type Old Value New Value
    Added Description Jooby is a web framework for Java and Kotlin. The pac4j io.jooby.internal.pac4j.SessionStoreImpl#get module deserializes untrusted data. This vulnerability is fixed in 2.17.0 (2.x) and 3.7.0 (3.x).
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
    Added CWE CWE-502
    Added Reference https://github.com/jooby-project/jooby/blob/v2.x/modules/jooby-pac4j/src/main/java/io/jooby/internal/pac4j/SessionStoreImpl.java#L39-L45
    Added Reference https://github.com/jooby-project/jooby/blob/v3.6.1/modules/jooby-pac4j/src/main/java/io/jooby/internal/pac4j/SessionStoreImpl.java#L77-L84
    Added Reference https://github.com/jooby-project/jooby/commit/3e13562cf36d7407813eae464e0f4b598de15692
    Added Reference https://github.com/jooby-project/jooby/security/advisories/GHSA-7c5v-895v-w4q5
Share the Post:

Related Posts