
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability identified as CVE-2025-50151 affects Apache Jena versions up to 5.4.0. The vulnerability stems from insufficient validation of file access paths in configuration files that can be uploaded by users with administrator access. The issue was disclosed on July 21, 2025, and has been assigned a high severity rating (SecurityOnline, NVD).
The vulnerability has been classified under CWE-20 (Improper Input Validation). The CVSS v3.1 base score is 8.8 (HIGH) with the following vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. This indicates that the vulnerability can be exploited over the network, requires low attack complexity, needs low privileges, requires no user interaction, and can result in high impacts to confidentiality, integrity, and availability (NVD).
The vulnerability could enable attackers with administrative access to manipulate file paths within uploaded configurations, potentially leading to arbitrary file access or manipulation on the server file system. This could result in system compromise or misuse of the Apache Jena framework (SecurityOnline).
Users are strongly recommended to upgrade to Apache Jena version 5.5.0, which implements proper validation mechanisms and does not allow arbitrary configuration uploads. This version includes safeguards against configuration file path manipulation (SecurityOnline, NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."