{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T00:01:47.984","vulnerabilities":[{"cve":{"id":"CVE-2025-23367","sourceIdentifier":"secalert@redhat.com","published":"2025-01-30T15:15:18.610","lastModified":"2026-02-10T14:16:09.357","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. \nThe vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action."},{"lang":"es","value":"Se encontró una falla en el proveedor Wildfly Server Role Based Access Control (RBAC). Cuando la autorización para controlar las operaciones de administración se asegura mediante el proveedor de control de acceso basado en roles, un usuario sin los privilegios requeridos puede suspender o reanudar el servidor. Se supone que un usuario con un rol de Monitor o Auditor solo tiene permisos de acceso de lectura y no debería poder suspender el servidor. La vulnerabilidad se debe a que los controladores de Suspensión y Reanudación no realizan comprobaciones de autorización para validar si el usuario actual tiene los permisos requeridos para continuar con la acción."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"7.4","versionEndExcluding":"7.4.21","matchCriteriaId":"48709188-93C0-4992-B09F-CEC7A16EABEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.0.7","matchCriteriaId":"E3FD087B-337E-4069-AF83-9BD2938EB81B"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:wildfly:*:*:*:*:*:*:*:*","versionEndExcluding":"27.0.1","matchCriteriaId":"AB978A4B-0A80-4E19-B910-CF9DA9A1E892"},{"vulnerable":true,"criteria":"cpe:2.3:a:redhat:wildfly:28.0.0:beta1:*:*:*:*:*:*","matchCriteriaId":"39D9F54C-D628-4CD5-81A6-2F003A00EDF3"}]}]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2025:3465","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2025:3467","source":"secalert@redhat.com","tags":["Issue Tracking"]},{"url":"https://access.redhat.com/errata/RHSA-2025:3989","source":"secalert@redhat.com","tags":["Issue Tracking"]},{"url":"https://access.redhat.com/errata/RHSA-2025:3990","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2025:3992","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/security/cve/CVE-2025-23367","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2337620","source":"secalert@redhat.com","tags":["Vendor Advisory"]},{"url":"https://github.com/advisories/GHSA-qr6x-62gq-4ccp","source":"secalert@redhat.com","tags":["Third Party Advisory"]}]}}]}