// For flags

CVE-2025-31119

CWE-470 in generator-jhipster-entity-audit when having Javers selected as Entity Audit Framework

Severity Score

7.6
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

generator-jhipster-entity-audit is a JHipster module to enable entity audit and audit log page. Prior to 5.9.1, generator-jhipster-entity-audit allows unsafe reflection when having Javers selected as Entity Audit Framework. If an attacker manages to place some malicious classes into the classpath and also has access to these REST interface for calling the mentioned REST endpoints, using these lines of code can lead to unintended remote code execution. This vulnerability is fixed in 5.9.1.

generator-jhipster-entity-audit es un módulo de JHipster que habilita la auditoría de entidades y la página de registro de auditoría. En versiones anteriores a la versión 5.9.1, generator-jhipster-entity-audit permitía la reflexión insegura al seleccionar Javers como marco de auditoría de entidades. Si un atacante logra insertar clases maliciosas en la ruta de clases y, además, tiene acceso a estas interfaces REST para llamar a los endpoints REST mencionados, el uso de estas líneas de código puede provocar la ejecución remota no intencionada de código. Esta vulnerabilidad se corrigió en la versión 5.9.1.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Authentication
Multiple
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2025-03-26 CVE Reserved
  • 2025-04-03 CVE Published
  • 2025-04-03 CVE Updated
  • 2025-04-04 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Jhipster
Search vendor "Jhipster"
Generator-jhipster-entity-audit
Search vendor "Jhipster" for product "Generator-jhipster-entity-audit"
< 5.9.1
Search vendor "Jhipster" for product "Generator-jhipster-entity-audit" and version " < 5.9.1"
en
Affected