GHSA-37pq-893f-g7q5

Suggest an improvement
Source
https://github.com/advisories/GHSA-37pq-893f-g7q5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/04/GHSA-37pq-893f-g7q5/GHSA-37pq-893f-g7q5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-37pq-893f-g7q5
Aliases
  • CVE-2025-3984
Published
2025-04-27T21:34:47Z
Modified
2025-04-28T21:27:14.880598Z
Severity
  • 5.0 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L CVSS Calculator
  • 2.3 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N CVSS Calculator
Summary
Apereo CAS code injection vulnerability
Details

A vulnerability was found in Apereo CAS 5.2.6 and classified as critical. Affected by this issue is the function saveService of the file cas-5.2.6\webapp-mgmt\cas-management-webapp-support\src\main\java\org\apereo\cas\mgmt\services\web\RegisteredServiceSimpleFormController.java of the component Groovy Code Handler. The manipulation leads to code injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Database specific
{
    "nvd_published_at": "2025-04-27T20:15:15Z",
    "cwe_ids": [
        "CWE-74"
    ],
    "severity": "LOW",
    "github_reviewed": true,
    "github_reviewed_at": "2025-04-28T20:39:01Z"
}
References

Affected packages

Maven / org.apereo.cas:cas-management-webapp-support

Package

Name
org.apereo.cas:cas-management-webapp-support
View open source insights on deps.dev
Purl
pkg:maven/org.apereo.cas/cas-management-webapp-support

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
5.2.6

Affected versions

5.*

5.0.0.M1
5.0.0.M2
5.0.0.M3
5.0.0.RC1
5.0.0.RC2
5.0.0.RC3
5.0.0.RC4
5.0.0
5.0.1
5.0.2
5.0.3
5.0.3.1
5.0.4
5.0.5
5.0.6
5.0.7
5.0.8
5.0.9
5.0.10
5.1.0-RC1
5.1.0-RC2
5.1.0-RC3
5.1.0-RC4
5.1.0
5.1.1
5.1.2
5.1.3
5.1.4
5.1.5
5.1.6
5.1.7
5.1.8
5.1.9
5.2.0-RC1
5.2.0-RC2
5.2.0-RC3
5.2.0-RC4
5.2.0
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.2.6