Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48734: CWE-284 Improper Access Control in Apache Software Foundation Apache Commons BeanUtils 1.x

0
High
VulnerabilityCVE-2025-48734cvecve-2025-48734cwe-284
Published: Wed May 28 2025 (05/28/2025, 13:32:08 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Commons BeanUtils 1.x

Description

Improper Access Control vulnerability in Apache Commons. A special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to the classloader. However this protection was not enabled by default. PropertyUtilsBean (and consequently BeanUtilsBean) now disallows declared class level property access by default. Releases 1.11.0 and 2.0.0-M2 address a potential security issue when accessing enum properties in an uncontrolled way. If an application using Commons BeanUtils passes property paths from an external source directly to the getProperty() method of PropertyUtilsBean, an attacker can access the enum’s class loader via the “declaredClass” property available on all Java “enum” objects. Accessing the enum’s “declaredClass” allows remote attackers to access the ClassLoader and execute arbitrary code. The same issue exists with PropertyUtilsBean.getNestedProperty(). Starting in versions 1.11.0 and 2.0.0-M2 a special BeanIntrospector suppresses the “declaredClass” property. Note that this new BeanIntrospector is enabled by default, but you can disable it to regain the old behavior; see section 2.5 of the user's guide and the unit tests. This issue affects Apache Commons BeanUtils 1.x before 1.11.0, and 2.x before 2.0.0-M2.Users of the artifact commons-beanutils:commons-beanutils 1.x are recommended to upgrade to version 1.11.0, which fixes the issue. Users of the artifact org.apache.commons:commons-beanutils2 2.x are recommended to upgrade to version 2.0.0-M2, which fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:41:50 UTC

Technical Analysis

CVE-2025-48734 is an improper access control vulnerability identified in Apache Commons BeanUtils versions 1.x prior to 1.11.0 and 2.x prior to 2.0.0-M2. The root cause lies in the handling of Java enum properties, specifically the 'declaredClass' property, which exposes the enum's class loader. Attackers can exploit this by passing crafted property paths from external sources directly to the getProperty() or getNestedProperty() methods of PropertyUtilsBean, thereby gaining unauthorized access to the class loader. This access can be leveraged to execute arbitrary code remotely, posing a critical security risk. To mitigate this, the Apache Commons team introduced a special BeanIntrospector starting in version 1.9.2, which suppresses access to the 'declaredClass' property. However, this protection was not enabled by default until versions 1.11.0 and 2.0.0-M2, where it became the default behavior. Users can disable this protection to revert to legacy behavior, but this is strongly discouraged. The vulnerability is classified under CWE-284 (Improper Access Control) and has a CVSS v3.1 base score of 8.8, indicating a high-severity issue with network attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the potential for remote code execution makes this a critical risk for affected applications.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary code by exploiting improper access control in Apache Commons BeanUtils. This can lead to full system compromise, data breaches, and disruption of services. Since BeanUtils is widely used in Java applications for property manipulation, many enterprise applications, middleware, and frameworks that depend on it are at risk. Exploitation can undermine confidentiality by exposing sensitive data, integrity by allowing unauthorized code execution, and availability by potentially causing system crashes or denial of service. Organizations using vulnerable versions in internet-facing applications or processing untrusted input are particularly at risk. The requirement for some level of privilege (PR:L) means attackers may need limited access but no user interaction is needed, increasing the risk in multi-user environments. The broad use of Apache Commons libraries in global software stacks amplifies the potential impact across industries including finance, healthcare, government, and technology sectors.

Mitigation Recommendations

1. Upgrade all Apache Commons BeanUtils dependencies to version 1.11.0 or later for 1.x series, or 2.0.0-M2 or later for 2.x series, where the BeanIntrospector blocking 'declaredClass' access is enabled by default. 2. Audit application code to ensure that property paths passed to getProperty() and getNestedProperty() methods are never derived directly from untrusted external input. Implement strict input validation and sanitization to prevent injection of malicious property paths. 3. Avoid disabling the BeanIntrospector protection unless absolutely necessary and only after thorough risk assessment. 4. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with custom rules to detect and block suspicious property path access patterns targeting enum properties. 5. Conduct thorough code reviews and penetration testing focusing on property manipulation APIs to identify potential misuse or exposure. 6. Monitor application logs for unusual access patterns related to BeanUtils property calls, especially attempts to access 'declaredClass' or other sensitive properties. 7. Educate developers about secure usage of reflection and property utilities to prevent similar vulnerabilities in the future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-05-23T12:30:32.006Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68371302182aa0cae24e8dee

Added to database: 5/28/2025, 1:43:30 PM

Last enriched: 2/26/2026, 9:41:50 PM

Last updated: 3/24/2026, 10:50:08 PM

Views: 150

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses