Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-48734— Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum's declaredClass property by default

EPSS 0.26% · P49
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-48734

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum's declaredClass property by default
Source: NVD (National Vulnerability Database)
Vulnerability Description
Improper Access Control vulnerability in Apache Commons. A special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to the classloader. However this protection was not enabled by default. PropertyUtilsBean (and consequently BeanUtilsBean) now disallows declared class level property access by default. Releases 1.11.0 and 2.0.0-M2 address a potential security issue when accessing enum properties in an uncontrolled way. If an application using Commons BeanUtils passes property paths from an external source directly to the getProperty() method of PropertyUtilsBean, an attacker can access the enum’s class loader via the “declaredClass” property available on all Java “enum” objects. Accessing the enum’s “declaredClass” allows remote attackers to access the ClassLoader and execute arbitrary code. The same issue exists with PropertyUtilsBean.getNestedProperty(). Starting in versions 1.11.0 and 2.0.0-M2 a special BeanIntrospector suppresses the “declaredClass” property. Note that this new BeanIntrospector is enabled by default, but you can disable it to regain the old behavior; see section 2.5 of the user's guide and the unit tests. This issue affects Apache Commons BeanUtils 1.x before 1.11.0, and 2.x before 2.0.0-M2.Users of the artifact commons-beanutils:commons-beanutils 1.x are recommended to upgrade to version 1.11.0, which fixes the issue. Users of the artifact org.apache.commons:commons-beanutils2 2.x are recommended to upgrade to version 2.0.0-M2, which fixes the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
访问控制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Commons 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Commons是美国阿帕奇(Apache)基金会的一个专注于可重用 Java 组件各个方面的 Apache 项目。 Apache Commons存在安全漏洞,该漏洞源于访问控制不当,可能导致攻击者通过枚举对象的declaredClass属性访问类加载器并执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache Commons BeanUtils 1.x 1.0 ~ 1.11.0 -
Apache Software FoundationApache Commons BeanUtils 2.x 2.0.0-M1 ~ 2.0.0-M2 -

II. Public POCs for CVE-2025-48734

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-48734

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2025-05-28 · 4 CVEs total

CVE-2025-27528Apache InLong: JDBC Vulnerability for Invisible Character Bypass Leading to Arbitrary File
CVE-2025-27526Apache InLong: JDBC Vulnerability For URLEncode and backspace bypass
CVE-2025-27522Apache InLong: JDBC Vulnerability during verification processing

IV. Related Vulnerabilities

V. Comments for CVE-2025-48734

No comments yet


Leave a comment