CVE-2023-25581

CRITICAL

Org.pac4j Pac4j-core < 4.0.0 - Insecure Deserialization

Title source: rule
STIX 2.1

Description

pac4j is a security framework for Java. `pac4j-core` prior to version 4.0.0 is affected by a Java deserialization vulnerability. The vulnerability affects systems that store externally controlled values in attributes of the `UserProfile` class from pac4j-core. It can be exploited by providing an attribute that contains a serialized Java object with a special prefix `{#sb64}` and Base64 encoding. This issue may lead to Remote Code Execution (RCE) in the worst case. Although a `RestrictedObjectInputStream` is in place, that puts some restriction on what classes can be deserialized, it still allows a broad range of java packages and potentially exploitable with different gadget chains. pac4j versions 4.0.0 and greater are not affected by this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Exploits (1)

nomisec WORKING POC
by p33d · poc
https://github.com/p33d/CVE-2023-25581

Scores

CVSS v4 9.2
EPSS 0.1903
EPSS Percentile 95.4%
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact total

Details

CWE
CWE-502
Status published
Products (2)
org.pac4j/pac4j-core 0 - 4.0.0Maven
pac4j/pac4j < 4.0.0
Published Oct 10, 2024
Tracked Since Feb 18, 2026