CVE-2025-53003
Java vulnerability analysis and mitigation

Overview

The Janssen Project's Config API vulnerability (CVE-2025-53003) was discovered and disclosed on June 30, 2025. This critical security flaw affects the open-source identity and access management (IAM) platform's Config API in versions prior to 1.8.0. The vulnerability allows the API to return results without proper scope verification, affecting both Janssen (<1.8.0) and Gluu Flex (<5.8.0) users (GitHub Advisory).

Technical details

The vulnerability stems from the Config API's failure to properly verify scope permissions before returning results. This security flaw has been assigned a CVSS v4.0 score of 8.2 (HIGH) with the vector string CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N. The issue is classified under multiple CWE categories including CWE-200 (Exposure of Sensitive Information), CWE-269 (Improper Privilege Management), and CWE-284 (Improper Access Control) (NVD).

Impact

Despite being an internal service that should not be exposed to the internet, this vulnerability presents a significant security risk with a large internal surface attack area. It potentially exposes sensitive information from the Identity Provider (IDP) including clients, users, and scripts. The vulnerability affects the confidentiality of the system by allowing unauthorized access to sensitive data (GitHub Security Advisory).

Mitigation and workarounds

The vulnerability has been patched in Janssen version 1.8.0 and Gluu Flex version 5.8.0. Users are strongly advised to upgrade immediately to these versions. For those unable to upgrade immediately, a temporary workaround involves forking and building the config API, then applying the patch following commit 92eea4d (GitHub Release).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management