{
  "threat_severity" : "Low",
  "public_date" : "2025-05-09T09:34:38Z",
  "bugzilla" : {
    "description" : "apache-commons-configuration: Apache Commons Configuration: Uncontrolled Resource Consumption when loading untrusted configurations in 1.x",
    "id" : "2365306",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2365306"
  },
  "cvss3" : {
    "cvss3_base_score" : "3.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
    "status" : "draft"
  },
  "cwe" : "CWE-400",
  "details" : [ "Uncontrolled Resource Consumption vulnerability in Apache Commons Configuration 1.x.\nThere are a number of issues in Apache Commons Configuration 1.x that allow excessive resource consumption when loading untrusted configurations or using unexpected usage patterns. The Apache Commons Configuration team does not intend to fix these issues in 1.x. Apache Commons Configuration 1.x is still safe to use in scenario's where you only load trusted configurations. \nUsers that load untrusted configurations or give attackers control over usage patterns are recommended to upgrade to the 2.x version line, which fixes these issues. Apache Commons Configuration 2.x is not a drop-in replacement, but as it uses a separate Maven groupId and Java package namespace they can be loaded side-by-side, making it possible to do a gradual migration.", "A flaw was found in the Apache Commons Configuration. This vulnerability allows uncontrolled resource consumption via loading untrusted configuration files or attacker-controlled usage patterns." ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "apache-commons-configuration",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-46392\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-46392\nhttps://lists.apache.org/thread/y1pl0mn3opz6kwkm873zshjdxq3dwq5s\nhttps://www.cve.org/CVERecord?id=CVE-2024-29131\nhttps://www.cve.org/CVERecord?id=CVE-2024-29133" ],
  "name" : "CVE-2025-46392",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}