BIT-wildfly-2025-23367

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/wildfly/BIT-wildfly-2025-23367.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-wildfly-2025-23367
Aliases
Published
2025-10-15T08:51:55.776Z
Modified
2025-11-06T13:25:46.476Z
Summary
Org.wildfly.core:wildfly-server: wildfly improper rbac permission
Details

A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.

Database specific
{
    "cpes": [
        "cpe:2.3:a:redhat:wildfly:*:*:*:*:*:*:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / wildfly

Package

Name
wildfly
Purl
pkg:bitnami/wildfly

Severity

  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
27.0.1
Introduced
28.0.0
Fixed
31.0.1