Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10492: CWE-502 Deserialization of Untrusted Data in Jaspersoft JasperReports Library Community Edition

0
High
VulnerabilityCVE-2025-10492cvecve-2025-10492cwe-502
Published: Tue Sep 16 2025 (09/16/2025, 16:41:44 UTC)
Source: CVE Database V5
Vendor/Project: Jaspersoft
Product: JasperReports Library Community Edition

Description

A Java deserialisation vulnerability has been discovered in Jaspersoft Library. Improper handling of externally supplied data may allow attackers to execute arbitrary code remotely on systems that use the affected library

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 10:54:31 UTC

Technical Analysis

CVE-2025-10492 is a vulnerability classified under CWE-502, which pertains to the deserialization of untrusted data. The affected product is the Jaspersoft JasperReports Library Community Edition, a widely used Java reporting tool. The vulnerability stems from the library's improper handling of externally supplied serialized data, which can be crafted by an attacker to execute arbitrary code remotely on the target system. This type of vulnerability is particularly dangerous because Java deserialization flaws often allow attackers to bypass typical security controls and execute code with the privileges of the application. The CVSS 4.0 vector indicates the attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but some level of privilege is needed, no user interaction (UI:N), and results in high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability affects all versions of the JasperReports Library Community Edition, with no patches currently listed, and no known exploits in the wild as of the publication date. Given the nature of the vulnerability, exploitation could lead to full system compromise, data theft, or service disruption. The vulnerability is critical for environments where JasperReports is exposed to untrusted inputs or accessible over networks without adequate protections.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on JasperReports Library in their Java-based reporting and business intelligence systems. Successful exploitation could lead to remote code execution, enabling attackers to take control of affected servers, access sensitive data, manipulate reports, or disrupt services. This can result in data breaches, loss of data integrity, and operational downtime. Sectors such as finance, healthcare, government, and manufacturing, which often use reporting tools for critical decision-making, are particularly vulnerable. The impact is exacerbated in environments where JasperReports is integrated into larger enterprise applications or exposed to external networks without sufficient segmentation. Additionally, the lack of known exploits currently does not diminish the urgency, as threat actors may develop and deploy exploits rapidly once the vulnerability details are widely known.

Mitigation Recommendations

1. Monitor Jaspersoft’s official channels for patches or updates addressing CVE-2025-10492 and apply them immediately upon release. 2. Until patches are available, restrict network access to JasperReports Library services to trusted internal networks only, using firewalls and network segmentation. 3. Implement strict input validation and sanitization to prevent untrusted serialized data from being processed. 4. Employ Java security best practices such as disabling deserialization of arbitrary objects or using allowlists for classes during deserialization. 5. Conduct code reviews and security testing focused on deserialization logic within applications using JasperReports. 6. Use runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block suspicious deserialization activities. 7. Educate development and operations teams about the risks of deserialization vulnerabilities and secure coding practices. 8. Regularly audit and monitor logs for unusual activity related to JasperReports usage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Jaspersoft
Date Reserved
2025-09-15T16:26:21.449Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c995a8cb0fe83b58201ab1

Added to database: 9/16/2025, 4:51:52 PM

Last enriched: 2/11/2026, 10:54:31 AM

Last updated: 3/24/2026, 10:32:04 AM

Views: 1715

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses