CVE-2022-25167
Java vulnerability analysis and mitigation

Overview

Apache Flume versions 1.4.0 through 1.9.0 were identified with a remote code execution (RCE) vulnerability, tracked as CVE-2022-25167. The vulnerability was discovered by the Flume development team and publicly disclosed on June 14, 2022. The issue affects configurations that use a JMS Source with a JNDI LDAP data source URI, particularly when an attacker has control of the target LDAP server (CVE Details).

Technical details

The vulnerability exists in Flume's JMSSource class, which can be configured with a connection factory name. The core issue lies in the JNDI lookup process, which is performed on this name without proper validation, potentially leading to the deserialization of untrusted data. The severity of this vulnerability is classified as medium (Openwall).

Impact

When exploited, this vulnerability could allow attackers to execute remote code on affected systems through the deserialization of untrusted data when using the JMS Source component with JNDI LDAP data source URIs (NVD).

Mitigation and workarounds

The vulnerability has been fixed in Apache Flume version 1.10.0, which implements stricter protocol validation. In the new version, if a protocol is specified in the connection factory parameter, only the java protocol is allowed. If no protocol is specified, it is also allowed. For versions 1.4.0 through 1.9.0, it is recommended not to use the JMSSource component (Openwall).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-14306CRITICAL10
  • JavaJava
  • net.sf.robocode:robocode.core
NoYesDec 09, 2025
CVE-2025-14307CRITICAL9.3
  • JavaJava
  • net.sf.robocode:robocode.battle
NoYesDec 09, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • at.yawk.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
GHSA-93fv-4pm9-xp28MEDIUM6.9
  • JavaJava
  • net.dv8tion:jda
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management