A vulnerability was found in Apereo CAS 5.2.6. It has been declared as problematic. This vulnerability affects unknown code of the file cas-5.2.6\core\cas-server-core-configuration-metadata-repository\src\main\java\org\apereo\cas\metadata\rest\CasConfigurationMetadataServerController.java. The manipulation of the argument Name leads to inefficient regular expression complexity. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://vuldb.com/?ctiid.306322 | Permissions Required VDB Entry |
| https://vuldb.com/?id.306322 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.557473 | Third Party Advisory VDB Entry |
| https://wx.mail.qq.com/s?k=rk-m8GwRMVMcOjBY1a | Not Applicable |
Configurations
History
05 Nov 2025, 21:37
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Apereo
Apereo central Authentication Service |
|
| CPE | cpe:2.3:a:apereo:central_authentication_service:5.2.6:*:*:*:*:*:*:* | |
| References | () https://vuldb.com/?ctiid.306322 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.306322 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.557473 - Third Party Advisory, VDB Entry | |
| References | () https://wx.mail.qq.com/s?k=rk-m8GwRMVMcOjBY1a - Not Applicable |
29 Apr 2025, 13:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
27 Apr 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-27 21:15
Updated : 2025-11-05 21:37
NVD link : CVE-2025-3986
Mitre link : CVE-2025-3986
CVE.ORG link : CVE-2025-3986
JSON object : View
Products Affected
apereo
- central_authentication_service
