You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: advisories/github-reviewed/2025/03/GHSA-3jxr-23ph-c89g/GHSA-3jxr-23ph-c89g.json
+5-6Lines changed: 5 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,12 @@
1
1
{
2
2
"schema_version": "1.4.0",
3
3
"id": "GHSA-3jxr-23ph-c89g",
4
-
"modified": "2025-06-03T17:32:56Z",
4
+
"modified": "2026-02-13T20:52:09Z",
5
5
"published": "2025-03-04T18:33:43Z",
6
-
"aliases": [
7
-
"CVE-2025-23368"
8
-
],
9
-
"summary": "Wildfly Elytron integration susceptible to brute force attacks via CLI",
10
-
"details": "A flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI.",
6
+
"withdrawn": "2026-02-13T20:52:09Z",
7
+
"aliases": [],
8
+
"summary": "Duplicate Advisory: Wildfly Elytron integration susceptible to brute force attacks via CLI",
9
+
"details": "### Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-qhp6-6p8p-2rqh. This link is maintained to preserve external references.\n\n### Original Description\nA flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI.",
"summary": "Wildfly Elytron integration susceptible to brute force attacks via CLI",
10
+
"details": "### Impact\n\nA flaw was found in Wildfly Elytron integration. The component does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it more susceptible to brute force attacks via CLI.\n\n### Patches\n\nThe default behaviour has been changed in WildFly Core 31.0.3.Final, and 32.0.0.Beta3 - the first version is used by WildFly 39.0.1.Final and the second will be included in WildFly 40.\n\n### Workarounds\n\nNo direct workaround.\nMonitoring network traffic / blocking suspicious traffic may help.\n\n### References\n\nhttps://www.cve.org/CVERecord?id=CVE-2025-23368\nhttps://issues.redhat.com/browse/WFCORE-7192\n\n### Acknowledgements\n\nWe would like to thank Claudia Bartolini (TIM S.p.A), Marco Ventura (TIM S.p.A), and Massimiliano Brolli (TIM S.p.A) for reporting this issue.",
0 commit comments