Ladybug adds message-based debugging, unit, system, and regression testing to Java applications. Versions prior to 3.0-20251107.114628 contain the APIs /iaf/ladybug/api/report/{storage} and /iaf/ladybug/api/report/upload, which allow uploading gzip-compressed XML files with user-controllable content. The system deserializes these XML files, enabling attackers to achieve Remote Code Execution (RCE) by submitting carefully crafted XML payloads and thereby gain access to the target server. This issue is fixed in version 3.0-20251107.114628.
References
| Link | Resource |
|---|---|
| https://github.com/wearefrank/ladybug/security/advisories/GHSA-f9fh-r3cv-398f | Exploit Vendor Advisory |
| https://github.com/wearefrank/ladybug/security/advisories/GHSA-f9fh-r3cv-398f | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-12-09 20:15
Updated : 2025-12-17 14:32
NVD link : CVE-2025-66214
Mitre link : CVE-2025-66214
CVE.ORG link : CVE-2025-66214
JSON object : View
Products Affected
wearefrank
- ladybug
CWE
CWE-502
Deserialization of Untrusted Data
