Template Engine Vulnerability in Apache OFBiz Affects Multiple Versions
CVE-2025-26865

3.5LOW

Key Information:

Vendor
Apache
Vendor
CVE Published:
10 March 2025

Badges

📈 Score: 215👾 Exploit Exists🟡 Public PoC

What is CVE-2025-26865?

CVE-2025-26865 is a vulnerability affecting Apache OFBiz, an open-source enterprise resource planning (ERP) system designed to manage various business processes. This specific vulnerability arises from improper handling of special elements within the template engine used by the software. If exploited, this issue could allow attackers to manipulate the processing of templates, potentially compromising the integrity and security of the application. Organizations relying on affected versions of Apache OFBiz could face significant risks if they fail to address this vulnerability.

Technical Details

The vulnerability manifests due to a regression introduced between versions 18.12.17 and 18.12.18 of Apache OFBiz, which can compromise the handling of template engine elements. Importantly, the previous version (18.12.17) remains unaffected, meaning that organizations utilizing this version can operate without immediate concern. However, those using any version within the affected range should prioritize upgrading to version 18.12.18, which rectifies the vulnerability.

Potential Impact of CVE-2025-26865

  1. Unauthorized Access: The vulnerability could enable attackers to bypass intended security measures, resulting in unauthorized access to sensitive data within the application.

  2. Data Integrity Risks: Exploitation may lead to the manipulation of template rendering processes, potentially compromising the integrity of data displayed or processed by the system.

  3. Operational Disruption: A successful exploit could disrupt normal operations of the Apache OFBiz instance, affecting businesses' ability to manage their processes effectively and leading to reputational damage.

Affected Version(s)

Apache OFBiz 18.12.17 < 18.12.18

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
3.5
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Physical
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Matei "Mal" Badanoiu
.