Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-23367: Improper Access Control

0
Medium
VulnerabilityCVE-2025-23367cvecve-2025-23367
Published: Thu Jan 30 2025 (01/30/2025, 14:30:04 UTC)
Source: CVE

Description

A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 12:36:28 UTC

Technical Analysis

CVE-2025-23367 is a medium-severity vulnerability identified in the Wildfly Server's Role Based Access Control (RBAC) provider. The flaw arises because the Suspend and Resume operation handlers fail to verify whether the user has the necessary privileges before allowing these actions. Specifically, users assigned to roles such as Monitor or Auditor, which are intended to have read-only access, can exploit this vulnerability to suspend or resume the server, actions that should be restricted to higher privileged roles. This improper access control undermines the RBAC enforcement mechanism, allowing unauthorized users to disrupt server availability. The vulnerability affects Wildfly versions from 0 up to 28.0.0.Beta1. The CVSS 3.1 base score is 6.5, reflecting a network attack vector, low attack complexity, requiring low privileges but no user interaction, and impacting availability only. Although no known exploits are currently reported in the wild, the vulnerability could be leveraged by attackers to cause denial-of-service conditions by suspending critical server operations. The issue was reserved and published in January 2025, with enrichment from CISA, indicating recognition by US cybersecurity authorities. The lack of authorization checks in critical management operations highlights a significant design oversight in the RBAC implementation of Wildfly's management interface.

Potential Impact

The primary impact of CVE-2025-23367 is on the availability of systems running Wildfly servers. Unauthorized users with limited roles can suspend or resume the server, potentially causing service interruptions or denial-of-service conditions. This can disrupt business operations, especially for organizations relying on Wildfly for critical Java application hosting and management. Although confidentiality and integrity are not directly affected, the ability to suspend server operations without proper authorization can lead to operational downtime, loss of productivity, and potential cascading effects on dependent services. In environments with strict uptime requirements or where Wildfly servers manage critical infrastructure, this vulnerability could be exploited to cause significant disruption. The ease of exploitation (network accessible, low privileges required, no user interaction) increases the risk of opportunistic attacks. Organizations lacking proper monitoring or compensating controls may face increased exposure to availability attacks.

Mitigation Recommendations

To mitigate CVE-2025-23367, organizations should apply any available patches or updates from Wildfly as soon as they are released. In the absence of immediate patches, administrators should restrict access to the Wildfly management interface to trusted users only, using network segmentation, firewalls, or VPNs to limit exposure. Review and tighten RBAC role assignments to ensure that only fully trusted administrators have permissions to suspend or resume the server. Implement monitoring and alerting on management operations to detect unauthorized suspend or resume actions promptly. Consider disabling or restricting the Suspend and Resume operations if they are not required in the environment. Additionally, conduct regular audits of user roles and permissions to prevent privilege escalation or misuse. Employ defense-in-depth strategies such as multi-factor authentication for management access and logging all administrative actions for forensic analysis. Finally, stay informed on vendor advisories and threat intelligence updates related to Wildfly vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-01-14T15:23:42.645Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9e1d

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 2/27/2026, 12:36:28 PM

Last updated: 3/25/2026, 6:56:27 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses