Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-9309 | Jooby is a web framework for Java and Kotlin. The pac4j io.jooby.internal.pac4j.SessionStoreImpl#get module deserializes untrusted data. This vulnerability is fixed in 2.17.0 (2.x) and 3.7.0 (3.x). |
Github GHSA |
GHSA-7c5v-895v-w4q5 | jooby-pac4j: deserialization of untrusted data |
Tue, 01 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 31 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jooby is a web framework for Java and Kotlin. The pac4j io.jooby.internal.pac4j.SessionStoreImpl#get module deserializes untrusted data. This vulnerability is fixed in 2.17.0 (2.x) and 3.7.0 (3.x). | |
| Title | jooby-pac4j: deserialization of untrusted data | |
| Weaknesses | CWE-502 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-01T13:53:56.983Z
Reserved: 2025-03-26T15:04:52.627Z
Link: CVE-2025-31129
Updated: 2025-03-31T21:06:59.321Z
Status : Deferred
Published: 2025-03-31T19:15:43.023
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-31129
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA