CVE-2023-4043
Java vulnerability analysis and mitigation

Overview

In Eclipse Parsson before versions 1.1.4 and 1.0.5, a vulnerability was discovered related to JSON parsing from untrusted sources. The issue stems from the built-in support for parsing numbers with large scale in Java, where certain edge cases in the input text of a number can lead to unexpectedly large processing times (NVD, Rapid7).

Technical details

The vulnerability is classified with a CVSS v3.1 Base Score of 7.5 (HIGH) according to NVD, while Eclipse Foundation rates it at 5.9 (MEDIUM). The issue is categorized under CWE-834 (Excessive Iteration) and CWE-20 (Improper Input Validation). The vulnerability specifically relates to the processing of numbers with large scale values in JSON parsing, where certain numerical inputs can cause the parser to consume excessive processing time (NVD).

Impact

The primary impact of this vulnerability is the potential for Denial of Service (DoS) attacks. When processing untrusted source content, the parsing of numbers with large scale values can lead to significantly extended processing times, effectively causing a denial of service condition (Red Hat).

Mitigation and workarounds

To address this vulnerability, Eclipse Parsson implemented size limits for numbers and their scale in versions 1.1.4 and 1.0.5. Users are advised to upgrade to these or later versions. The fix specifically modifies how the parser handles BigInteger scale limits and includes additional validation for number parsing (GitHub PR).

Community reactions

The vulnerability has been acknowledged and addressed by multiple organizations, including Red Hat, which has released security advisories and patches for affected products such as JBoss Enterprise Application Platform and Apache Camel (Red Hat Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26866HIGH8.8
  • JavaJava
  • org.apache.hugegraph:hg-pd-core
NoYesDec 12, 2025
CVE-2025-54981HIGH7.5
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025
CVE-2025-67721MEDIUM6.3
  • JavaJava
  • trino
NoYesDec 12, 2025
CVE-2025-53960MEDIUM5.9
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025
CVE-2025-54947MEDIUM5.3
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management