CVE-2025-53066

7.5 HIGH

📋 TL;DR

This vulnerability in Oracle Java's JAXP component allows unauthenticated attackers to access sensitive data via network protocols. It affects multiple Java SE and GraalVM versions, particularly impacting systems running untrusted code in sandboxed environments like Java Web Start or applets.

💻 Affected Systems

Products:
  • Oracle Java SE
  • Oracle GraalVM for JDK
  • Oracle GraalVM Enterprise Edition
Versions: Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16, 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15
Operating Systems: All platforms running affected Java versions
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Java deployments loading untrusted code in sandboxed environments (Java Web Start, applets) and applications using JAXP APIs to process XML data.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete unauthorized access to all accessible data in vulnerable Java deployments, potentially exposing sensitive information.

🟠

Likely Case

Data exfiltration from vulnerable Java applications, especially those processing untrusted XML content via JAXP APIs.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external attackers from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitable via multiple protocols through JAXP APIs, potentially through web services supplying data to vulnerable APIs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle Critical Patch Update October 2025

Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2025.html

Restart Required: Yes

Instructions:

1. Review Oracle Critical Patch Update October 2025 advisory. 2. Download and apply appropriate patches for your Java version. 3. Restart affected Java applications and services. 4. Verify patch installation.

🔧 Temporary Workarounds

Disable Java Web Start and Applets

all

Prevent execution of untrusted code in sandboxed environments

For browsers: Disable Java plugin
For systems: Remove or disable Java Web Start

Network Segmentation

all

Restrict network access to Java applications using JAXP

Configure firewall rules to limit inbound connections to Java services

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Monitor for suspicious data access patterns in Java applications

🔍 How to Verify

Check if Vulnerable:

Check Java version with 'java -version' and compare against affected versions list

Check Version:

java -version

Verify Fix Applied:

Verify Java version is updated beyond affected versions and check patch installation logs

📡 Detection & Monitoring

Log Indicators:

  • Unusual data access patterns in Java application logs
  • Multiple failed API calls to JAXP components

Network Indicators:

  • Unexpected outbound data transfers from Java processes
  • Suspicious inbound connections to Java services

SIEM Query:

source="java.log" AND ("JAXP" OR "XML parsing") AND (data_access OR unauthorized)

🔗 References

📤 Share & Export