Apache CXF Denial of service vulnerability in parsing JSON via JsonMapObjectReaderWriter
Description
A vulnerability in the JsonMapObjectReaderWriter of Apache CXF allows an attacker to submit malformed JSON to a web service, which results in the thread getting stuck in an infinite loop, consuming CPU indefinitely. This issue affects Apache CXF versions prior to 3.4.4; Apache CXF versions prior to 3.3.11.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A malformed JSON can cause an infinite loop in Apache CXF's JsonMapObjectReaderWriter, leading to denial of service.
Vulnerability
A vulnerability exists in the JsonMapObjectReaderWriter of Apache CXF, affecting versions prior to 3.4.4 and 3.3.11. An attacker can submit malformed JSON to a web service that processes JSON data through this reader, causing the parsing thread to enter an infinite loop and consume CPU indefinitely [1][2].
Exploitation
An attacker needs network access to the web service and the ability to send HTTP requests with crafted JSON payloads. No authentication or special privileges are required. By sending a specifically malformed JSON object to an endpoint that uses JsonMapObjectReaderWriter, the thread handling the request becomes stuck in an infinite loop [1][2].
Impact
Successful exploitation results in a denial of service (DoS) condition. The affected thread consumes CPU resources without completing, which can degrade performance or exhaust server resources, potentially impacting availability of the service for legitimate users [1][2].
Mitigation
Apache CXF versions 3.4.4 and 3.3.11 contain the fix for this vulnerability. Users should upgrade to these versions or later. No workarounds are provided in the available references [1][2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.cxf:apache-cxfMaven | >= 3.4.0, < 3.4.4 | 3.4.4 |
org.apache.cxf:apache-cxfMaven | < 3.3.11 | 3.3.11 |
org.apache.cxf:cxfMaven | >= 3.4.0, < 3.4.4 | 3.4.4 |
org.apache.cxf:cxfMaven | < 3.3.11 | 3.3.11 |
Affected products
3- ghsa-coords2 versions
>= 3.4.0, < 3.4.4+ 1 more
- (no CPE)range: >= 3.4.0, < 3.4.4
- (no CPE)range: >= 3.4.0, < 3.4.4
- Apache Software Foundation/Apache CXFv5Range: Apache CXF
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
28- github.com/advisories/GHSA-g23v-p5jq-jvh4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-30468ghsaADVISORY
- cxf.apache.org/security-advisories.data/CVE-2021-30468.txt.ascghsax_refsource_MISCWEB
- www.openwall.com/lists/oss-security/2021/06/16/2ghsamailing-listx_refsource_MLISTWEB
- lists.apache.org/thread.html/r3f46ae38e4a6e80c069cdb320e0ce831b0a21a12ef0cc92c0943f34a%40%3Ccommits.tomee.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r3f46ae38e4a6e80c069cdb320e0ce831b0a21a12ef0cc92c0943f34a@%3Ccommits.tomee.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r4771084730c4cf6e59eda60b4407122c86f174eb750b24f610ba9ff4%40%3Ccommits.tomee.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r4771084730c4cf6e59eda60b4407122c86f174eb750b24f610ba9ff4@%3Ccommits.tomee.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r4a4b6bc0520b69c18d2a59daa6af84ae49f0c22164dccb8538794459%40%3Cannounce.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r4a4b6bc0520b69c18d2a59daa6af84ae49f0c22164dccb8538794459%40%3Cdev.cxf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r4a4b6bc0520b69c18d2a59daa6af84ae49f0c22164dccb8538794459%40%3Cusers.cxf.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r4a4b6bc0520b69c18d2a59daa6af84ae49f0c22164dccb8538794459@%3Cannounce.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r4a4b6bc0520b69c18d2a59daa6af84ae49f0c22164dccb8538794459@%3Cdev.cxf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r4a4b6bc0520b69c18d2a59daa6af84ae49f0c22164dccb8538794459@%3Cusers.cxf.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r54c0f1cbbb9f381dfbedb9ea5e90ecb1c0a15371f40c4b10322ac737%40%3Ccommits.tomee.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r54c0f1cbbb9f381dfbedb9ea5e90ecb1c0a15371f40c4b10322ac737@%3Ccommits.tomee.apache.org%3EghsaWEB
- lists.apache.org/thread.html/ra833f78b3fa577cb43558cf343859a1bf70b1c5ce2353b3877d96422%40%3Ccommits.tomee.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/ra833f78b3fa577cb43558cf343859a1bf70b1c5ce2353b3877d96422@%3Ccommits.tomee.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rac07822057521dccf33ab5d136e0e8c599a6e2c8ac75e44ffbdc6e07%40%3Ccommits.tomee.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rac07822057521dccf33ab5d136e0e8c599a6e2c8ac75e44ffbdc6e07@%3Ccommits.tomee.apache.org%3EghsaWEB
- lists.apache.org/thread.html/re5b2a2b77faa22684d47bd2ac6623135c615565328ff40a1ec705448%40%3Ccommits.tomee.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/re5b2a2b77faa22684d47bd2ac6623135c615565328ff40a1ec705448@%3Ccommits.tomee.apache.org%3EghsaWEB
- lists.apache.org/thread.html/re9e05c6cab5f0dcc827eba4e6fcf26fa0b493e7ca84d62c867a80d03%40%3Ccommits.tomee.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/re9e05c6cab5f0dcc827eba4e6fcf26fa0b493e7ca84d62c867a80d03@%3Ccommits.tomee.apache.org%3EghsaWEB
- security.netapp.com/advisory/ntap-20210917-0002ghsaWEB
- security.netapp.com/advisory/ntap-20210917-0002/mitrex_refsource_CONFIRM
- www.oracle.com/security-alerts/cpuapr2022.htmlghsax_refsource_MISCWEB
- www.oracle.com/security-alerts/cpuoct2021.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.