Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Affecting commons-beanutils:commons-beanutils package, versions [1.0,1.11.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-COMMONSBEANUTILS-10259368
  • published29 May 2025
  • disclosed28 May 2025
  • creditMuthukumar Marikani

Introduced: 28 May 2025

NewCVE-2025-48734  (opens in a new tab)
CWE-470  (opens in a new tab)

How to fix?

Upgrade commons-beanutils:commons-beanutils to version 1.11.0 or higher.

Overview

commons-beanutils:commons-beanutils is a provides an easy-to-use but flexible wrapper around reflection and introspection.

Affected versions of this package are vulnerable to Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') via the getProperty and getNestedProperty methods of the PropertyUtilsBean class. An attacker can execute arbitrary code by accessing the declaredClass property of Java enum objects, which allows access to the ClassLoader.

Note:

The BeanIntrospector class that can mitigate this vulnerability was added in version 1.9.2 but its usage was not enabled by default.

CVSS Base Scores

version 4.0
version 3.1