Arbitrary Code Injection Affecting eap7-wildfly package, versions <0:7.4.23-3.GA_redhat_00002.1.el8eap


Severity

Recommended
0.0
high
0
10

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.09% (26th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL8-EAP7WILDFLY-10752715
  • published15 Jul 2025
  • disclosed3 Jun 2025

Introduced: 3 Jun 2025

CVE-2025-35036  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade RHEL:8 eap7-wildfly to version 0:7.4.23-3.GA_redhat_00002.1.el8eap or higher.
This issue was patched in RHSA-2025:10925.

NVD Description

Note: Versions mentioned in the description apply only to the upstream eap7-wildfly package and not the eap7-wildfly package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

Hibernate Validator before 6.2.0 and 7.0.0, by default and depending how it is used, may interpolate user-supplied input in a constraint violation message with Expression Language. This could allow an attacker to access sensitive information or execute arbitrary Java code. Hibernate Validator as of 6.2.0 and 7.0.0 no longer interpolates custom constraint violation messages with Expression Language and strongly recommends not allowing user-supplied input in constraint violation messages. CVE-2020-5245 and CVE-2025-4428 are examples of related, downstream vulnerabilities involving Expression Language intepolation of user-supplied data.

CVSS Base Scores

version 3.1