{
  "_class" : "io.jenkins.plugins.analysis.core.restapi.ReportApi",
  "issues" : [
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "cxf-core-3.6.5-gov4j-2.jar",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/usr/local/tomcat/webapps/govwayConsole.war/WEB-INF/lib/cxf-core-3.6.5-gov4j-2.jar",
      "fingerprint" : "FALLBACK-f9ab34fa",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-48795: LanguageSpecificPackageVulnerability\u000a\u000aorg.apache.cxf/cxf: Apache CXF denial of service and data exposure\u000a\u000aFor additional help see: **Vulnerability CVE-2025-48795**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|org.apache.cxf:cxf-core|3.5.11, 3.6.6, 4.0.7, 4.1.1|[CVE-2025-48795](https://avd.aquasec.com/nvd/cve-2025-48795)|\u000a\u000aApache CXF stores large stream based messages as temporary files on the local filesystem. A bug was introduced which means that the entire temporary file is read into memory and then logged. An attacker might be able to exploit this to cause a denial of service attack by causing an out of memory exception. In addition, it is possible to configure CXF to encrypt temporary files to prevent sensitive credentials from being cached unencrypted on the local filesystem, however this bug means that the cached files are written out to logs unencrypted.\u000a\u000aUsers are recommended to upgrade to versions 3.5.11, 3.6.6, 4.0.7 or 4.1.1, which fixes this issue.\u000a\u000aPackage: org.apache.cxf:cxf-core\u000aInstalled Version: 3.6.5\u000aVulnerability CVE-2025-48795\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.11, 3.6.6, 4.0.7, 4.1.1\u000aLink: [CVE-2025-48795](https://avd.aquasec.com/nvd/cve-2025-48795)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1269",
      "severity" : "NORMAL",
      "toString" : "cxf-core-3.6.5-gov4j-2.jar(1,0): CVE-2025-48795: : CVE-2025-48795: LanguageSpecificPackageVulnerability\u000a\u000aorg.apache.cxf/cxf: Apache CXF denial of service and data exposure\u000a\u000aFor additional help see: **Vulnerability CVE-2025-48795**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|org.apache.cxf:cxf-core|3.5.11, 3.6.6, 4.0.7, 4.1.1|[CVE-2025-48795](https://avd.aquasec.com/nvd/cve-2025-48795)|\u000a\u000aApache CXF stores large stream based messages as temporary files on the local filesystem. A bug was introduced which means that the entire temporary file is read into memory and then logged. An attacker might be able to exploit this to cause a denial of service attack by causing an out of memory exception. In addition, it is possible to configure CXF to encrypt temporary files to prevent sensitive credentials from being cached unencrypted on the local filesystem, however this bug means that the cached files are written out to logs unencrypted.\u000a\u000aUsers are recommended to upgrade to versions 3.5.11, 3.6.6, 4.0.7 or 4.1.1, which fixes this issue.\u000a\u000aPackage: org.apache.cxf:cxf-core\u000aInstalled Version: 3.6.5\u000aVulnerability CVE-2025-48795\u000aSeverity: MEDIUM\u000aFixed Version: 3.5.11, 3.6.6, 4.0.7, 4.1.1\u000aLink: [CVE-2025-48795](https://avd.aquasec.com/nvd/cve-2025-48795)",
      "type" : "CVE-2025-48795"
    }
  ],
  "size" : 1,
  "toString" : "1 warning (normal: 1)"
}