{"uuid": "d87083b2-460a-48ad-a413-e610c303fe6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-31119", "type": "seen", "source": "https://t.me/cvedetector/22017", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-31119 - JHipster Entity Audit Remote Code Execution (RCE)\", \n  \"Content\": \"CVE ID : CVE-2025-31119 \nPublished : April 3, 2025, 8:15 p.m. | 1\u00a0hour ago \nDescription : generator-jhipster-entity-audit is a JHipster module to enable entity audit and audit log page. Prior to 5.9.1, generator-jhipster-entity-audit allows unsafe reflection when having Javers selected as Entity Audit Framework. If an attacker manages to place some malicious classes into the classpath and also has access to these REST interface for calling the mentioned REST endpoints, using these lines of code can lead to unintended remote code execution. This vulnerability is fixed in 5.9.1. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-03T23:36:14.000000Z"}