CVE-2025-3985

A vulnerability was found in Apereo CAS 5.2.6. It has been classified as problematic. This affects the function ResponseEntity of the file cas-5.2.6\webapp-mgmt\cas-management-webapp-support\src\main\java\org\apereo\cas\mgmt\services\web\ManageRegisteredServicesMultiActionController.java. The manipulation of the argument Query leads to inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://vuldb.com/?ctiid.306321 Permissions Required VDB Entry
https://vuldb.com/?id.306321 Third Party Advisory VDB Entry
https://vuldb.com/?submit.557110 Third Party Advisory VDB Entry
https://wx.mail.qq.com/s?k=lzDuxVkSRXUZ0bwZEG Not Applicable
Configurations

Configuration 1 (hide)

cpe:2.3:a:apereo:central_authentication_service:5.2.6:*:*:*:*:*:*:*

History

05 Nov 2025, 21:30

Type Values Removed Values Added
References () https://vuldb.com/?ctiid.306321 - () https://vuldb.com/?ctiid.306321 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.306321 - () https://vuldb.com/?id.306321 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.557110 - () https://vuldb.com/?submit.557110 - Third Party Advisory, VDB Entry
References () https://wx.mail.qq.com/s?k=lzDuxVkSRXUZ0bwZEG - () https://wx.mail.qq.com/s?k=lzDuxVkSRXUZ0bwZEG - Not Applicable
First Time Apereo
Apereo central Authentication Service
CPE cpe:2.3:a:apereo:central_authentication_service:5.2.6:*:*:*:*:*:*:*

29 Apr 2025, 13:52

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en Apereo CAS 5.2.6. Se ha clasificado como problemática. Afecta a la función ResponseEntity del archivo cas-5.2.6\webapp-mgmt\cas-management-webapp-support\src\main\java\org\apereo\cas\mgmt\services\web\ManageRegisteredServicesMultiActionController.java. La manipulación del argumento "Query" genera una complejidad ineficiente en las expresiones regulares. Es posible iniciar el ataque de forma remota. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación para informarle sobre esta divulgación, pero no respondió.

27 Apr 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-27 21:15

Updated : 2025-11-05 21:30


NVD link : CVE-2025-3985

Mitre link : CVE-2025-3985

CVE.ORG link : CVE-2025-3985


JSON object : View

Products Affected

apereo

  • central_authentication_service
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-1333

Inefficient Regular Expression Complexity