We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-31119

CWE-470 in generator-jhipster-entity-audit when having Javers selected as Entity Audit Framework



Description

generator-jhipster-entity-audit is a JHipster module to enable entity audit and audit log page. Prior to 5.9.1, generator-jhipster-entity-audit allows unsafe reflection when having Javers selected as Entity Audit Framework. If an attacker manages to place some malicious classes into the classpath and also has access to these REST interface for calling the mentioned REST endpoints, using these lines of code can lead to unintended remote code execution. This vulnerability is fixed in 5.9.1.

Reserved 2025-03-26 | Published 2025-04-03 | Updated 2025-04-03 | Assigner GitHub_M


HIGH: 7.7CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H

Problem types

CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

Product status

< 5.9.1
affected

References

github.com/...-audit/security/advisories/GHSA-7rmp-3g9f-cvq8

github.com/...e_/web/rest/JaversEntityAuditResource.java.ejs

cve.org (CVE-2025-31119)

nvd.nist.gov (CVE-2025-31119)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-31119

Support options

Helpdesk Chat, Email, Knowledgebase