CVE-2025-3985

A vulnerability was found in Apereo CAS 5.2.6. It has been classified as problematic. This affects the function ResponseEntity of the file cas-5.2.6\webapp-mgmt\cas-management-webapp-support\src\main\java\org\apereo\cas\mgmt\services\web\ManageRegisteredServicesMultiActionController.java. The manipulation of the argument Query leads to inefficient regular expression complexity. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://vuldb.com/?ctiid.306321 Permissions Required VDB Entry
https://vuldb.com/?id.306321 Third Party Advisory VDB Entry
https://vuldb.com/?submit.557110 Third Party Advisory VDB Entry
https://wx.mail.qq.com/s?k=lzDuxVkSRXUZ0bwZEG Not Applicable
Configurations

Configuration 1 (hide)

cpe:2.3:a:apereo:central_authentication_service:5.2.6:*:*:*:*:*:*:*

History

05 Nov 2025, 21:30

Type Values Removed Values Added
First Time Apereo
Apereo central Authentication Service
CPE cpe:2.3:a:apereo:central_authentication_service:5.2.6:*:*:*:*:*:*:*
References () https://vuldb.com/?ctiid.306321 - () https://vuldb.com/?ctiid.306321 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.306321 - () https://vuldb.com/?id.306321 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.557110 - () https://vuldb.com/?submit.557110 - Third Party Advisory, VDB Entry
References () https://wx.mail.qq.com/s?k=lzDuxVkSRXUZ0bwZEG - () https://wx.mail.qq.com/s?k=lzDuxVkSRXUZ0bwZEG - Not Applicable

Information

Published : 2025-04-27 21:15

Updated : 2025-11-05 21:30


NVD link : CVE-2025-3985

Mitre link : CVE-2025-3985

CVE.ORG link : CVE-2025-3985


JSON object : View

Products Affected

apereo

  • central_authentication_service
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-1333

Inefficient Regular Expression Complexity