CVE-2022-22932
Java vulnerability analysis and mitigation

Overview

A partial path traversal vulnerability was discovered in Apache Karaf (CVE-2022-22932) affecting all versions prior to 4.2.15 or 4.3.6. The vulnerability exists in the Apache Karaf obr:* commands and run goal on the karaf-maven-plugin, which allows attackers to break out of the expected folder. The issue was discovered and reported by GHSL team member Jaroslav Lobačevski on January 7, 2022, and was fixed with the release of versions 4.3.6 and 4.2.15 on January 14, 2022 (Karaf Security, GitHub Security Lab).

Technical details

The vulnerability stems from two main issues in the codebase. The first issue is in FileUtil.java where the unjar method validates if the target file path starts with the expected directory. The second issue is in the maven plugin's RunMojo.java where the extract method performs similar validation. In both cases, if the result of getCanonicalPath() is not slash-terminated, it allows for partial path traversal. For example, '/usr/outnot'.startsWith('/usr/out') would bypass the check although it's not the intended directory (GitHub Security Lab).

Impact

The vulnerability allows attackers to break out of the expected folder structure, potentially accessing or manipulating files outside of the intended directory scope. However, the risk is considered low as the obr:* commands are not widely used and the entry point requires user input (Karaf Security).

Mitigation and workarounds

Users of Apache Karaf should upgrade to version 4.2.15 or 4.3.6 or later versions. The vulnerability has been fixed in revisions 36a2bc4 and 52b70cf. Alternatively, users should ensure they are using correct paths when working with the affected components (Karaf Security).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68931HIGH8.7
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-68703HIGH8.7
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-68704HIGH8.2
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-66169MEDIUM6.9
  • JavaJava
  • org.apache.camel:camel-neo4j
NoYesJan 14, 2026
CVE-2025-68925MEDIUM6.9
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management