CVE-2025-31129
HIGHIo.jooby Jooby-pac4j < 2.17.0 - Insecure Deserialization
Title source: ruleDescription
Jooby is a web framework for Java and Kotlin. The pac4j io.jooby.internal.pac4j.SessionStoreImpl#get module deserializes untrusted data. This vulnerability is fixed in 2.17.0 (2.x) and 3.7.0 (3.x).
Exploits (1)
References (4)
Core 4
Core References
Vendor Advisory x_refsource_confirm
https://github.com/jooby-project/jooby/security/advisories/GHSA-7c5v-895v-w4q5
Patch x_refsource_misc
https://github.com/jooby-project/jooby/commit/3e13562cf36d7407813eae464e0f4b598de15692
Scores
CVSS v3
8.8
EPSS
0.0048
EPSS Percentile
65.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-502
Status
published
Products (3)
io.jooby/jooby-pac4j
0 - 2.17.0Maven
jooby-project/jooby
< 2.17.0
jooby-project/jooby
>= 3.0.0.M1, < 3.7.0
Published
Mar 31, 2025
Tracked Since
Feb 18, 2026