{"uuid": "ecfe3c33-a7da-4e5c-a017-e116af3ed453", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2251", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13215", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2251\n\ud83d\udd25 CVSS Score: 6.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H)\n\ud83d\udd39 Description: A security flaw exists in WildFly and JBoss Enterprise Application Platform (EAP) within the Enterprise JavaBeans (EJB) remote invocation mechanism. This vulnerability stems from untrusted data deserialization handled by JBoss Marshalling. This flaw allows an attacker to send a specially crafted serialized object, leading to remote code execution without requiring authentication.\n\ud83d\udccf Published: 2025-04-07T14:06:46.985Z\n\ud83d\udccf Modified: 2025-04-24T11:00:53.903Z\n\ud83d\udd17 References:\n1. https://access.redhat.com/security/cve/CVE-2025-2251\n2. https://bugzilla.redhat.com/show_bug.cgi?id=2351678", "creation_timestamp": "2025-04-24T11:06:44.000000Z"}