-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from JXPath's default handling of XPath expressions via methods in JXPathContext (excluding compile/compilePath). These methods leverage the 'standard extension functions' feature, which allows invoking arbitrary Java classes/methods (e.g., java.lang.System.exit()). The advisory explicitly states all JXPathContext methods processing XPath strings are vulnerable. The PoC demonstrates RCE via these methods, and the user guide confirms the dangerous capability to call constructors/static methods through XPath.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| commons-jxpath:commons-jxpath | maven | <= 1.3 |
Ongoing coverage of React2Shell