Skip to content

jackson-databind-2.14.1.jar: 1 vulnerabilities (highest severity is: 8.7) [master] (reachable) #23

@mend-developer-platform-dev

Description

@mend-developer-platform-dev
📂 Vulnerable Library - jackson-databind-2.14.1.jar

General data-binding functionality for Jackson: works on core streaming API

Path to dependency file: /telegrambots-chat-session-bot/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.14.1/jackson-databind-2.14.1.jar

Findings

Finding Severity 🎯 CVSS Exploit Maturity EPSS Library Type Fixed in Remediation Available Reachability
CVE-2025-52999 🔴 High 8.7 Not Defined < 1% jackson-core-2.14.1.jar Transitive N/A Reachable

Details

🔴CVE-2025-52999

Vulnerable Library - jackson-core-2.14.1.jar

Core Jackson processing abstractions (aka Streaming API), implementation for JSON

Library home page: http://fasterxml.com/

Path to dependency file: /telegrambots-meta/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-core/2.14.1/jackson-core-2.14.1.jar

Dependency Hierarchy:

  • jackson-databind-2.14.1.jar (Root Library)

    • jackson-core-2.14.1.jar (Vulnerable Library)
  • telegrambots-meta-6.5.0.jar (Root Library)

    • jackson-databind-2.14.1.jar
      • jackson-core-2.14.1.jar (Vulnerable Library)
  • telegrambots-6.5.0.jar (Root Library)

    • telegrambots-meta-6.5.0.jar
      • jackson-databind-2.14.1.jar
        • jackson-core-2.14.1.jar (Vulnerable Library)

Reachability Analysis

This vulnerability is potentially reachable:

- org.telegram.telegrambots.meta.api.objects.commands.scope.serialization.BotCommandScopeDeserializer (Application)
    - com.fasterxml.jackson.databind.DeserializationContext (Extension)
        - com.fasterxml.jackson.databind.json.JsonMapper (Extension)
            -> ❌ com.fasterxml.jackson.core.JsonEncoding (Vulnerable Component)

Vulnerability Details

jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources.

Publish Date: Jun 25, 2025 05:02 PM

URL: CVE-2025-52999

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.7


Suggested Fix

Type: Upgrade version

Origin:

Release Date:

Fix Resolution :

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions