CVE-2025-3588

5.3 MEDIUM

📋 TL;DR

A stack-based buffer overflow vulnerability exists in jsonschema2pojo 1.2.2's JSON file handler when processing malicious JSON schemas. This allows local attackers to potentially execute arbitrary code or crash the application. Only users who process untrusted JSON schemas with this specific version are affected.

💻 Affected Systems

Products:
  • joelittlejohn jsonschema2pojo
Versions: 1.2.2
Operating Systems: All platforms running Java
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects users who process JSON schemas from untrusted sources.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to complete system compromise via arbitrary code execution.

🟠

Likely Case

Application crash (denial of service) when processing malicious JSON schemas.

🟢

If Mitigated

No impact if proper input validation and sandboxing are implemented.

🌐 Internet-Facing: LOW - requires local access for exploitation.
🏢 Internal Only: MEDIUM - internal users with access to run jsonschema2pojo could exploit this.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires local access and ability to supply malicious JSON schema files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or using alternative tools.

🔧 Temporary Workarounds

Input validation and sanitization

all

Validate and sanitize all JSON schema inputs before processing with jsonschema2pojo

Run with reduced privileges

all

Execute jsonschema2pojo with minimal system privileges to limit potential damage

🧯 If You Can't Patch

  • Restrict access to jsonschema2pojo to trusted users only
  • Implement strict input validation for all JSON schema files

🔍 How to Verify

Check if Vulnerable:

Check if using jsonschema2pojo version 1.2.2 by examining build dependencies or running 'java -jar jsonschema2pojo.jar --version' if available

Check Version:

Check build configuration files (pom.xml, build.gradle) or run the tool with version flag

Verify Fix Applied:

Verify version is not 1.2.2 or that input validation controls are implemented

📡 Detection & Monitoring

Log Indicators:

  • Stack overflow errors in application logs
  • Unexpected application crashes when processing JSON

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Search for 'StackOverflowError' or application crash events related to jsonschema2pojo processes

🔗 References

📤 Share & Export