CVE-2025-10492: Vulnerability in Jaspersoft JasperReport Servers
A Java deserialisation vulnerability has been discovered in Jaspersoft Library. Improper handling of externally supplied data may allow attackers to execute arbitrary code remotely on systems that use the affected library
AI Analysis
Technical Summary
CVE-2025-10492 is a high-severity vulnerability affecting Jaspersoft JasperReport Servers version 7. The root cause is a Java deserialization flaw within the Jaspersoft library used by the JasperReport Server product. Deserialization vulnerabilities occur when untrusted data is processed insecurely during the conversion from a byte stream back into an object, allowing attackers to craft malicious serialized objects that, when deserialized, can trigger arbitrary code execution. In this case, improper handling of externally supplied data enables remote attackers to execute arbitrary code on affected systems without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability at a high level, given the potential for full system compromise. The CVSS 4.0 score of 8.7 reflects the ease of exploitation over the network with low attack complexity and no user interaction, but requiring low privileges. No known exploits in the wild have been reported yet, but the vulnerability’s characteristics make it a critical risk for organizations using JasperReport Servers version 7. JasperReports is widely used for business intelligence reporting, often integrated into enterprise applications, making this vulnerability a significant threat vector for data breaches, lateral movement, and persistent access if exploited.
Potential Impact
For European organizations, the impact of CVE-2025-10492 could be severe. JasperReport Servers are commonly deployed in sectors such as finance, healthcare, government, and manufacturing across Europe for generating reports and analytics. Successful exploitation could lead to unauthorized access to sensitive business intelligence data, disruption of reporting services, and potential pivoting to other internal systems. This could result in data breaches involving personal data protected under GDPR, causing regulatory penalties and reputational damage. Additionally, the ability to execute arbitrary code remotely could allow attackers to deploy ransomware or other malware, impacting operational continuity. Given the high integration of JasperReports in enterprise environments, the vulnerability could facilitate supply chain attacks or compromise of critical infrastructure components. The lack of user interaction and low attack complexity increases the risk of automated exploitation attempts, making timely mitigation essential.
Mitigation Recommendations
Organizations should immediately identify all instances of JasperReport Server version 7 in their environments. Since no patch links are provided, it is critical to monitor Jaspersoft’s official channels for security updates or patches addressing CVE-2025-10492. In the interim, network-level mitigations should be applied, such as restricting access to JasperReport Server interfaces to trusted internal networks or VPNs only, and implementing strict firewall rules to limit exposure to the internet. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads can help reduce risk. Additionally, organizations should audit and harden Java deserialization configurations, disable or restrict deserialization where possible, and apply runtime application self-protection (RASP) tools to detect anomalous behavior. Regularly review logs for unusual activity related to JasperReports and conduct penetration testing focused on deserialization attacks. Finally, ensure that all users with low privileges on the server have minimal permissions, as the vulnerability requires low privileges but not none.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-10492: Vulnerability in Jaspersoft JasperReport Servers
Description
A Java deserialisation vulnerability has been discovered in Jaspersoft Library. Improper handling of externally supplied data may allow attackers to execute arbitrary code remotely on systems that use the affected library
AI-Powered Analysis
Technical Analysis
CVE-2025-10492 is a high-severity vulnerability affecting Jaspersoft JasperReport Servers version 7. The root cause is a Java deserialization flaw within the Jaspersoft library used by the JasperReport Server product. Deserialization vulnerabilities occur when untrusted data is processed insecurely during the conversion from a byte stream back into an object, allowing attackers to craft malicious serialized objects that, when deserialized, can trigger arbitrary code execution. In this case, improper handling of externally supplied data enables remote attackers to execute arbitrary code on affected systems without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability impacts confidentiality, integrity, and availability at a high level, given the potential for full system compromise. The CVSS 4.0 score of 8.7 reflects the ease of exploitation over the network with low attack complexity and no user interaction, but requiring low privileges. No known exploits in the wild have been reported yet, but the vulnerability’s characteristics make it a critical risk for organizations using JasperReport Servers version 7. JasperReports is widely used for business intelligence reporting, often integrated into enterprise applications, making this vulnerability a significant threat vector for data breaches, lateral movement, and persistent access if exploited.
Potential Impact
For European organizations, the impact of CVE-2025-10492 could be severe. JasperReport Servers are commonly deployed in sectors such as finance, healthcare, government, and manufacturing across Europe for generating reports and analytics. Successful exploitation could lead to unauthorized access to sensitive business intelligence data, disruption of reporting services, and potential pivoting to other internal systems. This could result in data breaches involving personal data protected under GDPR, causing regulatory penalties and reputational damage. Additionally, the ability to execute arbitrary code remotely could allow attackers to deploy ransomware or other malware, impacting operational continuity. Given the high integration of JasperReports in enterprise environments, the vulnerability could facilitate supply chain attacks or compromise of critical infrastructure components. The lack of user interaction and low attack complexity increases the risk of automated exploitation attempts, making timely mitigation essential.
Mitigation Recommendations
Organizations should immediately identify all instances of JasperReport Server version 7 in their environments. Since no patch links are provided, it is critical to monitor Jaspersoft’s official channels for security updates or patches addressing CVE-2025-10492. In the interim, network-level mitigations should be applied, such as restricting access to JasperReport Server interfaces to trusted internal networks or VPNs only, and implementing strict firewall rules to limit exposure to the internet. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious serialized payloads can help reduce risk. Additionally, organizations should audit and harden Java deserialization configurations, disable or restrict deserialization where possible, and apply runtime application self-protection (RASP) tools to detect anomalous behavior. Regularly review logs for unusual activity related to JasperReports and conduct penetration testing focused on deserialization attacks. Finally, ensure that all users with low privileges on the server have minimal permissions, as the vulnerability requires low privileges but not none.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Jaspersoft
- Date Reserved
- 2025-09-15T16:26:21.449Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c995a8cb0fe83b58201ab1
Added to database: 9/16/2025, 4:51:52 PM
Last enriched: 9/16/2025, 4:54:29 PM
Last updated: 9/17/2025, 12:09:20 AM
Views: 6
Related Threats
CVE-2025-10589: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in N-Partner N-Reporter
HighCVE-2025-9818: CWE-428 Unquoted Search Path or Element in OMRON SOCIAL SOLUTIONS CO., Ltd. PowerAttendant Standard Edition
MediumCVE-2025-59518: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in lemonldap-ng LemonLDAP::NG
HighCVE-2025-58116: Improper neutralization of special elements used in an OS command ('OS Command Injection') in I-O DATA DEVICE, INC. WN-7D36QR
HighCVE-2025-55075: Hidden functionality in I-O DATA DEVICE, INC. WN-7D36QR
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.