GHSA-f7h5-c625-3795

Suggest an improvement
Source
https://github.com/advisories/GHSA-f7h5-c625-3795
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/07/GHSA-f7h5-c625-3795/GHSA-f7h5-c625-3795.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-f7h5-c625-3795
Aliases
Published
2025-07-16T12:30:25Z
Modified
2025-07-18T19:27:18.903373Z
Severity
  • 8.9 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N CVSS Calculator
Summary
Eclipse GlassFish is vulnerable to Server Side Request Forgery attacks through specific endpoints
Details

In Eclipse GlassFish version 6.2.5, it is possible to perform a Server Side Request Forgery attack using specific endpoints.

Database specific
{
    "github_reviewed": true,
    "severity": "HIGH",
    "github_reviewed_at": "2025-07-18T17:45:26Z",
    "cwe_ids": [
        "CWE-918"
    ],
    "nvd_published_at": "2025-07-16T12:15:23Z"
}
References

Affected packages

Maven / org.glassfish.main.admingui:console-common

Package

Name
org.glassfish.main.admingui:console-common
View open source insights on deps.dev
Purl
pkg:maven/org.glassfish.main.admingui/console-common

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
6.2.5

Affected versions

3.*

3.1.2
3.1.2.2

4.*

4.0-b33
4.0-b72
4.0-b90
4.0
4.1
4.1.1
4.1.2

5.*

5.0
5.0.1
5.1.0-RC1
5.1.0-RC2
5.1.0

6.*

6.0.0-M1
6.0.0-RC1
6.0.0-RC2
6.0.0-RC3
6.0.0-RC4
6.0.0
6.1.0
6.2.0
6.2.1
6.2.2
6.2.3
6.2.4
6.2.5