Skip to content

Conversation

spiros-spiros
Copy link

Hi, this PR bumps the version of Apache commons-lang in the Java client to 3.18.0. This resolves an uncontrolled recursion vulnerability via the ClassUtils.getClass function where an attacker can cause the application to terminate unexpectedly by providing excessively long input values.

The CVE is here: https://www.cve.org/CVERecord?id=CVE-2025-48924

The CVSS is an unusually high 8.8 so please merge as a priority. https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N

Hi, this PR bumps the version of Apache commons-lang to 3.18.0. This resolves an uncontrolled recursion vulnerability via the ClassUtils.getClass function where an attacker can cause the application to terminate unexpectedly by providing excessively long input values.

The CVE is here: https://www.cve.org/CVERecord?id=CVE-2025-48924

The CVSS is an unusually high 8.8 so please merge as a priority. https://www.first.org/cvss/calculator/4-0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
@spiros-spiros spiros-spiros self-assigned this Jul 14, 2025
Copy link

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR updates the Apache Commons Lang dependency in the Java client to address a high-severity recursion vulnerability in ClassUtils.getClass.

  • Bump commons-lang version from 3.17.0 to 3.18.0 to resolve CVE-2025-48924.

Copy link

@orca-security-eu orca-security-eu bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Orca Security Scan Summary

Status Check Issues by priority
Passed Passed Infrastructure as Code high 0   medium 0   low 0   info 0 View in Orca
Passed Passed SAST high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Secrets high 0   medium 0   low 0   info 0 View in Orca
Passed Passed Vulnerabilities high 0   medium 0   low 0   info 0 View in Orca

@weaviate-git-bot
Copy link

To avoid any confusion in the future about your contribution to Weaviate, we work with a Contributor License Agreement. If you agree, you can simply add a comment to this PR that you agree with the CLA so that we can merge.

beep boop - the Weaviate bot 👋🤖

PS:
Are you already a member of the Weaviate Slack channel?

@bevzzz
Copy link
Collaborator

bevzzz commented Jul 14, 2025

Superseded by #413

@bevzzz bevzzz closed this Jul 14, 2025
@bevzzz
Copy link
Collaborator

bevzzz commented Jul 14, 2025

Hey @spiros-spiros, thanks for giving this one the priority bump. I've collected all upgrades in #413, which we will merge today and include in the latest v5 release.

@bevzzz bevzzz deleted the Fix-high-severity-vuln-in-apache.commons-lang-3.17 branch August 27, 2025 16:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants