-
CVSS Score
-The vulnerability stems from missing authentication in REST endpoints after switching to Netty-based implementation. The core issue manifests in: 1) Cache resource handlers (getCache/putCacheEntry) processing requests without auth checks 2) RestServer initialization failing to configure security. These functions would appear in stack traces when handling unauthenticated requests to protected cache operations. The high-confidence entries map directly to HTTP method handlers shown in REST resource classes, while the RestServer.start() has medium confidence as the exact initialization flaw requires more implementation context.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.infinispan:infinispan-server-core | maven | < 9.0.0 | 9.0.0 |