Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:3989 - Security Advisory
Issued:
2025-04-17
Updated:
2025-04-17

RHSA-2025:3989 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: Red Hat JBoss Enterprise Application Platform 8.0.7 security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

A security update is now available for Red Hat JBoss Enterprise Application Platform 8.0 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Red Hat JBoss Enterprise Application Platform 8 is a platform for Java applications based on the WildFly application runtime. This release of Red Hat JBoss Enterprise Application Platform 8.0.7 serves as a replacement for Red Hat JBoss Enterprise Application Platform 8.0.6, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 8.0.7 Release Notes for information about the most significant bug fixes and enhancements included in this release.

Security Fix(es):

  • org.wildfly/wildfly-elytron-oidc-client-subsystem: OIDC Authorization Code Injection (CVE-2024-12369)
  • org.wildfly.core/wildfly-server: Wildfly improper RBAC permission (CVE-2025-23367)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258

Affected Products

  • JBoss Enterprise Application Platform 8.0 for RHEL 8 x86_64

Fixes

  • BZ - 2331178 - CVE-2024-12369 elytron-oidc-client: OIDC Authorization Code Injection
  • BZ - 2337620 - CVE-2025-23367 org.wildfly.core:wildfly-server: Wildfly improper RBAC permission
  • JBEAP-28382 - Tracker bug for the EAP 8.0.7 release for RHEL-8
  • JBEAP-28663 - [QE](8.0.z) WFCORE-6644 - Upgrade log4j2 from 2.19.0 to 2.22.1.redhat-00002
  • JBEAP-28842 - [GSS](8.0.z) Upgrade Weld from 5.1.2.Final-redhat-00001 to 5.1.5.Final-redhat-00001
  • JBEAP-28846 - [GSS](8.0.z) Upgrade Hibernate from 6.2.32.Final-redhat-00001 to 6.2.35.Final-redhat-00001
  • JBEAP-28847 - (8.0.z) Upgrade WildFly Core from 21.0.14.Final-redhat-00001 to 21.0.15.Final-redhat-00001
  • JBEAP-28900 - [GSS](8.0.z) Update Mojarra from 4.0.7.redhat-00001 to 4.0.10.redhat-00001
  • JBEAP-28902 - (8.0.z) Update EAP channel to use wildfly-ee-feature-pack-product-conf x.x.x in EAP 8.0 Update 7
  • JBEAP-28961 - (8.0.z) Upgrade Elytron from 2.2.7.Final-redhat-00001 to 2.2.8.Final-redhat-00001
  • JBEAP-28990 - [GSS](8.0.z) ELY-2874 - Upgrade Elytron 2.2.x's SSHD dependency to 2.12.1
  • JBEAP-29232 - (8.0.z) WFLY-20359 - Upgrade to org.glassfish:jakarta.enterprise.concurrent:3.0.1 to address intermittent TCK failures
  • JBEAP-29439 - (8.0.z) Upgrade Mojarra from 4.0.10.redhat-00001 to 4.0.11.redhat-00001
  • JBEAP-29445 - [GSS](8.0.z) Upgrade ironjacamar from 3.0.8.Final-redhat-00001 to 3.0.13.Final-redhat-00001
  • JBEAP-29483 - [GSS](8.0.z) HHH-18027 - Delete/Update statement with IN clause fails on second invocation
  • JBEAP-29555 - (8.0.z) Upgrade jboss-eap-installation-manager (prospero) to 1.1.17.Final

CVEs

  • CVE-2024-12369
  • CVE-2025-23367

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/8.0
  • https://access.redhat.com/articles/7114917
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Application Platform 8.0 for RHEL 8

SRPM
eap8-apache-commons-io-2.16.1-1.redhat_00001.1.el8eap.src.rpm SHA-256: f1b0f3208b83f5294a1a0b643e7f53c8c28ec0d600690476554db1336e05a127
eap8-bouncycastle-1.80.0-1.redhat_00001.1.el8eap.src.rpm SHA-256: 88c0520d0a8bba65f055fa62427e0f9f412adb3e5b54ae10d6084bfea50f131f
eap8-eap-product-conf-parent-800.7.0-2.GA_redhat_00002.1.el8eap.src.rpm SHA-256: a4dcbf36a78617351f97118d16c2d2bbfe7e64104c918f0a5460a85747fd9d3f
eap8-hibernate-6.2.35-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: 735c74b63589496a8652989adcb2bd225bac1fb870c732b16b93c537d3a00e16
eap8-ironjacamar-3.0.13-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: c9d19e1f29c8a855040fe88496f5e90452cb5cf281e64c4bff8c5bdae129a842
eap8-jakarta-enterprise-concurrent-3.0.1-1.redhat_00001.1.el8eap.src.rpm SHA-256: 58be4457582a19e28facb9d40c59dc9094ceb0ff1d2e5ecd5e886a90228d4e04
eap8-jsf-impl-4.0.11-1.redhat_00001.1.el8eap.src.rpm SHA-256: 009a7e6fc61653836691b7163744bd42c22bd4d09d981a2dcf80f97d91f2324e
eap8-reactive-streams-1.0.4-3.redhat_00004.1.el8eap.src.rpm SHA-256: 07546579d4d4a4aeae3074fec05baaf3b974b791f041544bdb3f47800e4f5668
eap8-reactivex-rxjava-3.1.10-1.redhat_00001.1.el8eap.src.rpm SHA-256: 842d027e475932e4862568b99c961014a552e2fb47e619c4a59dca9978ec32b2
eap8-weld-core-5.1.5-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: 76db0258b207014804f53c3352733db9d7a4330bad49776f74a6cbdef7009981
eap8-wildfly-8.0.7-3.GA_redhat_00004.1.el8eap.src.rpm SHA-256: ea0718859925fbde1d5aebaf0383ada5583d9a8027997f1aa59980c35baf2797
eap8-wildfly-elytron-2.2.9-1.Final_redhat_00001.1.el8eap.src.rpm SHA-256: 66991de65a88ac8251d87124d70c345c008578f0bb12369a72c78c2a96bc7e52
x86_64
eap8-apache-commons-io-2.16.1-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 4291615c73f85a918e78312be36bab531591bac457e70c0e3777a211f950c41d
eap8-bouncycastle-1.80.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: dad91e37073e4347653d46e0cbf8a5d84d4dd7a103b53a984c28d48a3b525669
eap8-bouncycastle-jmail-1.80.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 151b8c732ccb054f8b203e9326cac02cf6322f8ba1354d95813ba9db9542234e
eap8-bouncycastle-pg-1.80.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 706bf7cbf360e8833809ad4c2cacbb4ff171c0a1d312054378244566e503a7ec
eap8-bouncycastle-pkix-1.80.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 73044b49a792e0c06436a90e22f58e30067d94045445247ca4daf51d5da26b8b
eap8-bouncycastle-prov-1.80.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: c9a61cff4c986d93e9dd4deb0bee90f501896495ffeab643f328ac1a629a9384
eap8-bouncycastle-util-1.80.0-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 36704c2cb4f98c6d67162031dc766e0a1511421fb8a7f58c54cf9b6348007dd1
eap8-eap-product-conf-parent-800.7.0-2.GA_redhat_00002.1.el8eap.noarch.rpm SHA-256: fd952edb72805cd34a34b79b220d81a5ff03abb87aeb678227f10634c7d4e5ca
eap8-eap-product-conf-wildfly-ee-feature-pack-800.7.0-2.GA_redhat_00002.1.el8eap.noarch.rpm SHA-256: 469bd2dad87848a02f2da30e471886d925e5d9c62c3300713049144cfb86bd8f
eap8-hibernate-6.2.35-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 7b3486c190d15d65275fa4004ed620698bbf1ea2db597577668351e0135ee5b9
eap8-hibernate-core-6.2.35-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 29c7f05c888af5bff07c935ecbb49355aa6867ea35916554817c08533f2f0d0e
eap8-hibernate-envers-6.2.35-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 5abfe9c9977e565040e341da07d663ce128c7c46baf0b125d1e7821748520833
eap8-ironjacamar-3.0.13-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 232c3edf578db78556f7ddd807aa36113873169f97c097d8389dde4ea414b240
eap8-ironjacamar-common-api-3.0.13-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: dbf0da1c9c34f4e9f487acf6637331c112498772eeafa6224820f6c5ad052328
eap8-ironjacamar-common-impl-3.0.13-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: ac118f5f6f00cd3203f8fba47d81bc61b3fe7c2690bbbf5e0db348e37d09e9ef
eap8-ironjacamar-common-spi-3.0.13-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 0e872bd348da0f5371573efd61437ce9b945e329adaa2e86ddfc146f223eba3a
eap8-ironjacamar-core-api-3.0.13-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 7ea1ced77aa31e404e88ad7091dd5c015910db263da37acd81c1dec30bbd8da1
eap8-ironjacamar-core-impl-3.0.13-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: c4313a3d44ec08a727bb664067ced69dae1aaf8327658e38534309e0ce34e5e6
eap8-ironjacamar-deployers-common-3.0.13-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 7aa28255544d511004a3f4e5f9bed7dddf20415d3d89c3b1c33f79f1cdaa4705
eap8-ironjacamar-jdbc-3.0.13-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: cc56a54c7db163cd64a8e264d0f8d70ebaced31f816fe36fc2bd4db22bfc43a3
eap8-ironjacamar-validator-3.0.13-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 76502561eed7228152f154d283068474e18749c6ba630421ebbde76ec05369b3
eap8-jakarta-enterprise-concurrent-3.0.1-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 9d4b696782765e575f8207fe47fe100ab5bba24435e4a788578b4c15c34b399b
eap8-jsf-impl-4.0.11-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 7a4b0961513f34122923bd93edcce4be0532f8ae1ccb35822fdc61eb107cca58
eap8-reactive-streams-1.0.4-3.redhat_00004.1.el8eap.noarch.rpm SHA-256: d54fe7aae7424d2e7b46233e14ec44b62c124d7c726d1160e95bdc641868325f
eap8-reactivex-rxjava-3.1.10-1.redhat_00001.1.el8eap.noarch.rpm SHA-256: 9e551c28a7364f8bb83b10d215b2543ca6660a8f94741e81da558bbca05d3d24
eap8-weld-core-5.1.5-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 0db722789976e6d0addb2969b852f04a487551199930cdc47240cc37909865a8
eap8-weld-core-impl-5.1.5-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 64046684ae790b1c5e3943c265a06b500b4f5373f1b991b2dadf7d8b1ca4b05b
eap8-weld-core-jsf-5.1.5-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: a3eb5e7c2be567106b92f23a4195f3e3409c288a4e88e151ffee7f5e4aaa5a98
eap8-weld-ejb-5.1.5-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 0cafbd1a034d44ecb769cbf6804aad67fd188a038e9c08ab5da0e0df70634356
eap8-weld-jta-5.1.5-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: d7b6f92f0c2306f0335c7f6137a22657edb74e0b3f283a33f3c805cf302af14e
eap8-weld-lite-extension-translator-5.1.5-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 977f831525e9867741335d00c0e52f3f15f3352d9fca5922d43774e6ce084e73
eap8-weld-web-5.1.5-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: b7b642125f4a318c52a0645b6dd1f17addeee149344dcb6d5fffa08c378c599a
eap8-wildfly-8.0.7-3.GA_redhat_00004.1.el8eap.noarch.rpm SHA-256: 18d80039c33ea369818916f0f59759a10019ae79155e4266aea65cb24079556e
eap8-wildfly-elytron-2.2.9-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: 9f69641a20e699ea06b7baece0a4ba185332ec87a3c1701f5def86c547cf7159
eap8-wildfly-elytron-tool-2.2.9-1.Final_redhat_00001.1.el8eap.noarch.rpm SHA-256: bc3f4ebf3b77335755a38aa042431d833ec93cead90f9365c582027b1aa96517
eap8-wildfly-java-jdk11-8.0.7-3.GA_redhat_00004.1.el8eap.noarch.rpm SHA-256: a18dd7d577101af183b84d9632d450b132ee4b3efcd797ebbe914b216af238aa
eap8-wildfly-java-jdk17-8.0.7-3.GA_redhat_00004.1.el8eap.noarch.rpm SHA-256: f654a13798ce6cb21aa9b952b9ee544be7021b5af66602e780eb81f3514645d3
eap8-wildfly-java-jdk21-8.0.7-3.GA_redhat_00004.1.el8eap.noarch.rpm SHA-256: 2285304db1da8707ff89a336e1f5cb195d3214b2d7e53f838454569d566e06ce
eap8-wildfly-modules-8.0.7-3.GA_redhat_00004.1.el8eap.noarch.rpm SHA-256: b1ba2f59b6d50aea4c3a0732748bc110597213c54ae5dfec0f45f0bdefb21ecb

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility