Miggo Logo

CVE-2025-23215:
PMD Designer's release key passphrase (GPG) available on Maven Central in cleartext

9.3

CVSS Score
4.0

Basic Information

EPSS Score
0.13732%
Published
1/31/2025
Updated
2/6/2025
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Clear
Package NameEcosystemVulnerable VersionsFirst Patched Version
net.sourceforge.pmd:pmd-designermaven>= 7.0.0, < 7.10.07.10.0
net.sourceforge.pmd:pmd-coremaven>= 6.21.0, < 7.10.07.10.0
net.sourceforge.pmd:pmd-uimaven>= 6.14.0, <= 6.19.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from the build process configuration in pom.xml. The properties-maven-plugin's write-project-properties goal was used without filtering, automatically including all system properties (including sensitive GPG credentials) in designer.properties. This is evidenced by:

  1. The diff showing gpg.passphrase removal from designer.properties
  2. Commit 1548f5f replacing properties-maven-plugin with a more controlled properties writer
  3. The CWE-540 classification indicating sensitive info in source code/build artifacts
  4. The fix involved explicitly defining allowed properties rather than including all system properties

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry W*il* r**uil*in* [PM* **si*n*r](*ttps://*it*u*.*om/pm*/pm*-**si*n*r) *or R*pro*u*i*l* *uil*s *n* *i**in* into issu*s, I *oun* out t**t p*ssp*r*s* *or `*p*.k*yn*m*=*x****************` is in*lu*** in j*r pu*lis*** to M*v*n **ntr*l. ### **t

Reasoning

T** vuln*r**ility st*mm** *rom t** *uil* pro**ss *on*i*ur*tion in pom.xml. T** prop*rti*s-m*v*n-plu*in's writ*-proj**t-prop*rti*s *o*l w*s us** wit*out *ilt*rin*, *utom*ti**lly in*lu*in* *ll syst*m prop*rti*s (in*lu*in* s*nsitiv* *P* *r***nti*ls) in