CVE-2025-3588
📋 TL;DR
A stack-based buffer overflow vulnerability exists in jsonschema2pojo 1.2.2's JSON file handler when processing malicious JSON schemas. This allows local attackers to potentially execute arbitrary code or crash the application. Only users who process untrusted JSON schemas with this specific version are affected.
💻 Affected Systems
- joelittlejohn jsonschema2pojo
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation leading to complete system compromise via arbitrary code execution.
Likely Case
Application crash (denial of service) when processing malicious JSON schemas.
If Mitigated
No impact if proper input validation and sandboxing are implemented.
🎯 Exploit Status
Exploit requires local access and ability to supply malicious JSON schema files.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available or using alternative tools.
🔧 Temporary Workarounds
Input validation and sanitization
allValidate and sanitize all JSON schema inputs before processing with jsonschema2pojo
Run with reduced privileges
allExecute jsonschema2pojo with minimal system privileges to limit potential damage
🧯 If You Can't Patch
- Restrict access to jsonschema2pojo to trusted users only
- Implement strict input validation for all JSON schema files
🔍 How to Verify
Check if Vulnerable:
Check if using jsonschema2pojo version 1.2.2 by examining build dependencies or running 'java -jar jsonschema2pojo.jar --version' if available
Check Version:
Check build configuration files (pom.xml, build.gradle) or run the tool with version flag
Verify Fix Applied:
Verify version is not 1.2.2 or that input validation controls are implemented
📡 Detection & Monitoring
Log Indicators:
- Stack overflow errors in application logs
- Unexpected application crashes when processing JSON
Network Indicators:
- Not applicable - local vulnerability
SIEM Query:
Search for 'StackOverflowError' or application crash events related to jsonschema2pojo processes
🔗 References
- https://github.com/joelittlejohn/jsonschema2pojo/issues/1672
- https://github.com/joelittlejohn/jsonschema2pojo/issues/1672#issue-2968446816
- https://vuldb.com/?ctiid.304643
- https://vuldb.com/?id.304643
- https://vuldb.com/?submit.550136
- https://github.com/joelittlejohn/jsonschema2pojo/issues/1672
- https://github.com/joelittlejohn/jsonschema2pojo/issues/1672#issue-2968446816