Skip to content

telegrambots-meta-6.5.0.jar: 2 vulnerabilities (highest severity is: 8.7) [master] (reachable) #25

@mend-developer-platform-dev

Description

@mend-developer-platform-dev
📂 Vulnerable Library - telegrambots-meta-6.5.0.jar

Easy to use library to create Telegram Bots

Path to dependency file: /telegrambots-abilities/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/telegram/telegrambots-meta/6.5.0/telegrambots-meta-6.5.0.jar

Findings

Finding Severity 🎯 CVSS Exploit Maturity EPSS Library Type Fixed in Remediation Available Reachability
CVE-2025-52999 🔴 High 8.7 Not Defined < 1% jackson-core-2.14.1.jar Transitive N/A Reachable
CVE-2025-48924 🟠 Medium 6.9 Not Defined < 1% commons-lang3-3.12.0.jar Direct N/A Reachable

Details

🔴CVE-2025-52999

Vulnerable Library - jackson-core-2.14.1.jar

Core Jackson processing abstractions (aka Streaming API), implementation for JSON

Library home page: http://fasterxml.com/

Path to dependency file: /telegrambots-meta/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-core/2.14.1/jackson-core-2.14.1.jar

Dependency Hierarchy:

  • jackson-databind-2.14.1.jar (Root Library)

    • jackson-core-2.14.1.jar (Vulnerable Library)
  • telegrambots-meta-6.5.0.jar (Root Library)

    • jackson-databind-2.14.1.jar
      • jackson-core-2.14.1.jar (Vulnerable Library)
  • telegrambots-6.5.0.jar (Root Library)

    • telegrambots-meta-6.5.0.jar
      • jackson-databind-2.14.1.jar
        • jackson-core-2.14.1.jar (Vulnerable Library)

Reachability Analysis

This vulnerability is potentially reachable:

- org.telegram.telegrambots.meta.api.objects.commands.scope.serialization.BotCommandScopeDeserializer (Application)
    - com.fasterxml.jackson.databind.DeserializationContext (Extension)
        - com.fasterxml.jackson.databind.json.JsonMapper (Extension)
            -> ❌ com.fasterxml.jackson.core.JsonEncoding (Vulnerable Component)

Vulnerability Details

jackson-core contains core low-level incremental ("streaming") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources.

Publish Date: Jun 25, 2025 05:02 PM

URL: CVE-2025-52999

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 8.7


Suggested Fix

Type: Upgrade version

Origin:

Release Date:

Fix Resolution :

🟠CVE-2025-48924

Vulnerable Library - commons-lang3-3.12.0.jar

Apache Commons Lang, a package of Java utility classes for the
classes that are in java.lang's hierarchy, or are considered to be so
standard as to justify existence in java.lang.

Library home page: https://www.apache.org/

Path to dependency file: /telegrambots-spring-boot-starter/pom.xml

Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-lang3/3.12.0/commons-lang3-3.12.0.jar

Dependency Hierarchy:

  • commons-lang3-3.12.0.jar (Vulnerable Library)

  • telegrambots-meta-6.5.0.jar (Root Library)

    • commons-lang3-3.12.0.jar (Vulnerable Library)
  • telegrambots-6.5.0.jar (Root Library)

    • telegrambots-meta-6.5.0.jar
      • commons-lang3-3.12.0.jar (Vulnerable Library)

Reachability Analysis

This vulnerability is potentially reachable:

- org.telegram.telegrambots.meta.api.methods.send.SendInvoice (Application)
    - org.apache.commons.lang3.StringUtils (Extension)
        -> ❌ org.apache.commons.lang3.ArrayUtils (Vulnerable Component)

Vulnerability Details

Uncontrolled Recursion vulnerability in Apache Commons Lang.
This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0.
The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a
StackOverflowError could cause an application to stop.
Users are recommended to upgrade to version 3.18.0, which fixes the issue.
Mend Note: The description of this vulnerability differs from MITRE.

Publish Date: Jul 11, 2025 02:56 PM

URL: CVE-2025-48924

Threat Assessment

Exploit Maturity:Not Defined

EPSS:< 1%

Score: 6.9


Suggested Fix

Type: Upgrade version

Origin:

Release Date:

Fix Resolution :

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions