Those using JXPath to interpret untrusted XPath expressions may be vulnerable to a remote code execution attack. All JXPathContext class functions processing a XPath string are vulnerable except compile()
and compilePath()
function. The XPath expression can be used by an attacker to load any Java class from the classpath resulting in code execution.
{ "nvd_published_at": "2022-10-06T18:17:00Z", "cwe_ids": [ "CWE-470" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2022-10-06T20:35:33Z" }