{"uuid": "197c5ba5-78db-444d-9508-bb7ce7f84384", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2251", "type": "seen", "source": "https://t.me/cvedetector/22306", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2251 - WildFly/JBoss EAP EJB Remote Code Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2251 \nPublished : April 7, 2025, 2:15 p.m. | 23\u00a0minutes ago \nDescription : A security flaw exists in WildFly and JBoss Enterprise Application Platform (EAP) within the Enterprise JavaBeans (EJB) remote invocation mechanism. This vulnerability stems from untrusted data deserialization handled by JBoss Marshalling. This flaw allows an attacker to send a specially crafted serialized object, leading to remote code execution without requiring authentication. \nSeverity: 6.2 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-07T17:04:09.000000Z"}