Deserialization of Untrusted Data Affecting jackrabbit package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.3% (54th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Deserialization of Untrusted Data vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN12-JACKRABBIT-12554238
  • published9 Sept 2025
  • disclosed8 Sept 2025

Introduced: 8 Sep 2025

NewCVE-2025-58782  (opens in a new tab)
CWE-502  (opens in a new tab)

How to fix?

There is no fixed version for Debian:12 jackrabbit.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jackrabbit package and not the jackrabbit package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

Deserialization of Untrusted Data vulnerability in Apache Jackrabbit Core and Apache Jackrabbit JCR Commons.

This issue affects Apache Jackrabbit Core: from 1.0.0 through 2.22.1; Apache Jackrabbit JCR Commons: from 1.0.0 through 2.22.1.

Deployments that accept JNDI URIs for JCR lookup from untrusted users allows them to inject malicious JNDI references, potentially leading to arbitrary code execution through deserialization of untrusted data. Users are recommended to upgrade to version 2.22.2. JCR lookup through JNDI has been disabled by default in 2.22.2. Users of this feature need to enable it explicitly and are adviced to review their use of JNDI URI for JCR lookup.