#VU116606 Information Exposure Through an Error Message in jackson-core - CVE-2025-49128

 

#VU116606 Information Exposure Through an Error Message in jackson-core - CVE-2025-49128

Published: October 6, 2025


Vulnerability identifier: #VU116606
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2025-49128
CWE-ID: CWE-209
Exploitation vector: Local access
Exploit availability: No public exploit available
Vulnerable software:
jackson-core
Software vendor:
FasterXML

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability in jackson-core's `JsonLocation._appendSourceDesc` method allows up to 500 bytes of unintended memory content to be included in exception messages. When parsing JSON from a byte array with an offset and length, the exception message incorrectly reads from the beginning of the array instead of the logical payload start. This results in possible information disclosure in systems using pooled or reused buffers, like Netty or Vert.x. A local user can gain unauthorized access to sensitive information on the system.


Remediation

Install updates from vendor's website.

External links