CVE-2025-3986

A vulnerability was found in Apereo CAS 5.2.6. It has been declared as problematic. This vulnerability affects unknown code of the file cas-5.2.6\core\cas-server-core-configuration-metadata-repository\src\main\java\org\apereo\cas\metadata\rest\CasConfigurationMetadataServerController.java. The manipulation of the argument Name leads to inefficient regular expression complexity. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://vuldb.com/?ctiid.306322 Permissions Required VDB Entry
https://vuldb.com/?id.306322 Third Party Advisory VDB Entry
https://vuldb.com/?submit.557473 Third Party Advisory VDB Entry
https://wx.mail.qq.com/s?k=rk-m8GwRMVMcOjBY1a Not Applicable
Configurations

Configuration 1 (hide)

cpe:2.3:a:apereo:central_authentication_service:5.2.6:*:*:*:*:*:*:*

History

05 Nov 2025, 21:37

Type Values Removed Values Added
First Time Apereo
Apereo central Authentication Service
CPE cpe:2.3:a:apereo:central_authentication_service:5.2.6:*:*:*:*:*:*:*
References () https://vuldb.com/?ctiid.306322 - () https://vuldb.com/?ctiid.306322 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.306322 - () https://vuldb.com/?id.306322 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.557473 - () https://vuldb.com/?submit.557473 - Third Party Advisory, VDB Entry
References () https://wx.mail.qq.com/s?k=rk-m8GwRMVMcOjBY1a - () https://wx.mail.qq.com/s?k=rk-m8GwRMVMcOjBY1a - Not Applicable

29 Apr 2025, 13:52

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en Apereo CAS 5.2.6. Se ha declarado problemática. Esta vulnerabilidad afecta al código desconocido del archivo cas-5.2.6\core\cas-server-core-configuration-metadata-repository\src\main\java\org\apereo\cas\metadata\rest\CasConfigurationMetadataServerController.java. La manipulación del argumento Name genera una complejidad ineficiente en las expresiones regulares. El ataque puede iniciarse remotamente. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación para informarle sobre esta divulgación, pero no respondió.

27 Apr 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-27 21:15

Updated : 2025-11-05 21:37


NVD link : CVE-2025-3986

Mitre link : CVE-2025-3986

CVE.ORG link : CVE-2025-3986


JSON object : View

Products Affected

apereo

  • central_authentication_service
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-1333

Inefficient Regular Expression Complexity