Apache CXF is vulnerable to DoS attacks as entire files are read into memory and logged
Moderate severity
GitHub Reviewed
Published
Jul 15, 2025
to the GitHub Advisory Database
•
Updated Jul 17, 2025
Package
Affected versions
< 3.5.11
>= 3.6.0, < 3.6.6
>= 4.1.0, < 4.1.1
>= 4.0.0, < 4.0.7
Patched versions
3.5.11
3.6.6
4.1.1
4.0.7
Description
Published by the National Vulnerability Database
Jul 15, 2025
Published to the GitHub Advisory Database
Jul 15, 2025
Reviewed
Jul 16, 2025
Last updated
Jul 17, 2025
Apache CXF stores large stream based messages as temporary files on the local filesystem. A bug was introduced which means that the entire temporary file is read into memory and then logged. An attacker might be able to exploit this to cause a denial of service attack by causing an out of memory exception. In addition, it is possible to configure CXF to encrypt temporary files to prevent sensitive credentials from being cached unencrypted on the local filesystem, however this bug means that the cached files are written out to logs unencrypted.
Users are recommended to upgrade to versions 3.5.11, 3.6.6, 4.0.7 or 4.1.1, which fixes this issue.
References