Arbitrary Code Injection Affecting pki-resteasy-client package, versions *


Severity

Recommended
0.0
high
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.06% (20th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CENTOS9-PKIRESTEASYCLIENT-10301690
  • published4 Jun 2025
  • disclosed3 Jun 2025

Introduced: 3 Jun 2025

NewCVE-2025-35036  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

There is no fixed version for Centos:9 pki-resteasy-client.

NVD Description

Note: Versions mentioned in the description apply only to the upstream pki-resteasy-client package and not the pki-resteasy-client package as distributed by Centos. See How to fix? for Centos:9 relevant fixed versions and status.

Hibernate Validator before 6.2.0 and 7.0.0, by default and depending how it is used, may interpolate user-supplied input in a constraint violation message with Expression Language. This could allow an attacker to access sensitive information or execute arbitrary Java code. Hibernate Validator as of 6.2.0 and 7.0.0 no longer interpolates custom constraint violation messages with Expression Language and strongly recommends not allowing user-supplied input in constraint violation messages. CVE-2020-5245 and CVE-2025-4428 are examples of related, downstream vulnerabilities involving Expression Language intepolation of user-supplied data.

CVSS Base Scores

version 3.1