Vulnerability DatabaseGHSA-xmj9-7625-f634

GHSA-xmj9-7625-f634
Java vulnerability analysis and mitigation

Affected Components

Summary

  • The OIDC JWKS and Metadata Document caches used an inverted time comparison (isBefore instead of isAfter), causing the cache to never return cached values. Every incoming request triggered a fresh HTTP fetch of the OIDC Metadata Document and JWKS keys from the OIDC provider.
  • The OIDC token cache for the FHIR client connections used an inverted time comparison (isBefore instead of isAfter), causing the cache to never invalidate. Every incoming request returned the same OIDC token even if expired.

Impact

  • Performance: Every OIDC-authenticated request added network round-trips to the OIDC provider, increasing latency
  • Reliability: Cached OIDC tokens become unusable after expiration and can only be invalidated by restart of the BPE.

If the OIDC provider is temporarily unreachable, all requests fail immediately instead of using cached keys

  • Load: Unnecessary load on the OIDC provider, potentially causing rate limiting

Fix (commits 31c2e974d, d3ca59b4d)

  • Fixed cache timeout comparison from isBefore to isAfter in BaseOidcClientWithCache (configuration and JWKS caches) and OidcClientWithCache (configuration, JWKS, and access token caches)
  • Added configurable cache timeouts via dev.dsf.server.auth.oidc.provider.client.cache.timeout.configuration.resource and dev.dsf.server.auth.oidc.provider.client.cache.timeout.jwks.resource (default: PT1H)

SourceNVD

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-40478CRITICAL9
  • JavaJava
  • org.thymeleaf:thymeleaf-spring5
NoYesApr 15, 2026
CVE-2026-40477CRITICAL9
  • JavaJava
  • org.thymeleaf:thymeleaf-spring6
NoYesApr 15, 2026
CVE-2026-40882HIGH7.6
  • JavaJava
  • io.openremote:openremote-manager
NoYesApr 15, 2026
GHSA-gj7p-595x-qwf5MEDIUM6.8
  • JavaJava
  • dev.dsf:dsf-common-jetty
NoYesApr 15, 2026
GHSA-xmj9-7625-f634MEDIUM6.3
  • JavaJava
  • dev.dsf:dsf-bpe-server
NoYesApr 15, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management