CVE-2025-48734 – Apache Commons BeanUtils vulnerability

Severity: Medium2025-12-19

Security Advisories

Abstract

Improper Access Control vulnerability in Apache Commons. A special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to the classloader. However this protection was not enabled by default. PropertyUtilsBean (and consequently BeanUtilsBean) now disallows declared class level property access by default. Releases 1.11.0 and 2.0.0-M2 address a potential security issue when accessing enum properties in an uncontrolled way. If an application using Commons BeanUtils passes property paths from an external source directly to the getProperty() method of PropertyUtilsBean, an attacker can access the enum’s class loader via the “declaredClass” property available on all Java “enum” objects. Accessing the enum’s “declaredClass” allows remote attackers to access the ClassLoader and execute arbitrary code. The same issue exists with PropertyUtilsBean.getNestedProperty(). Starting in versions 1.11.0 and 2.0.0-M2 a special BeanIntrospector suppresses the “declaredClass” property. Note that this new BeanIntrospector is enabled by default, but you can disable it to regain the old behavior; see section 2.5 of the user's guide and the unit tests. This issue affects Apache Commons BeanUtils 1.x before 1.11.0, and 2.x before 2.0.0-M2.Users of the artifact commons-beanutils:commons-beanutils 1.x are recommended to upgrade to version 1.11.0, which fixes the issue. Users of the artifact org.apache.commons:commons-beanutils2 2.x are recommended to upgrade to version 2.0.0-M2, which fixes the issue.

The Oxygen products incorporate Apache Commons BeanUtils as a third-party library. This advisory was opened to address the potential impact of this third‑party library’s vulnerability.

Affected Products/Versions

ProductSeverityFixed Release Availability
Oxygen Content Fusion v8.1 and olderMediumOxygen Content Fusion 8.2 build build 2025082116
Oxygen XML Web Author v27.1.0 and olderMediumOxygen XML Web Author 27.1.0 build 2025082715

Mitigation

None

Detail

CVE-2025-48734

Severity: High

CVSS Score: 8.8

Vulnerable versions of Apache Commons BeanUtils (prior to 1.11.0) can allow unsafe property access when property names are influenced by untrusted input (for example, paths like declaredClass.classLoader passed to getProperty-like methods). In environments that deserialize untrusted data or where a gadget chain is reachable (such as certain Apache Shiro configurations), this can be abused to access the ClassLoader and may lead to remote code execution.

In our default configurations, Shiro’s rememberMe is not enabled and session data is stored in Redis that is not externally exposed. These factors reduce the likelihood of remote exploitation.

Starting with Oxygen Content Fusion version 8.1 build 2025062312 the vulnerable dependency was updated to a non-vulnerable version.

Starting with Oxygen XML Web Author version 27.1.0.4 build 2025082715 the vulnerable dependency was updated to a non-vulnerable version.

List of Security Advisories