Apache James server: Privilege escalation via JMX pre-authentication deserialisation
Description
Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data. Given a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result in privilege escalation. Note that by default JMX endpoint is only bound locally.
We recommend users to: - Upgrade to a non-vulnerable Apache James version
- Run Apache James isolated from other processes (docker - dedicated virtual machine)
- If possible turn off JMX
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache James before 3.7.5 and 3.8.0 allows pre-authentication deserialization of untrusted data via its localhost JMX endpoint.
In Apache James versions prior to 3.7.5 and 3.8.0, the JMX endpoint exposed on localhost is vulnerable to pre-authentication deserialization of untrusted data [1]. This means an attacker who can reach the JMX port (by default bound only to localhost) can send a crafted serialized object that the server will deserialize without requiring any authentication [1].
The vulnerability can be exploited if an attacker gains the ability to send data to the local JMX port, for example through another flaw that allows remote code execution or by having local access to the system. While the JMX endpoint is only bound to localhost by default, this still presents a risk if combined with other attack vectors that allow network or local access to the JMX interface [1].
Successful exploitation, given a suitable deserialization gadget available in the classpath, could allow an attacker to perform arbitrary code execution, leading to privilege escalation within the context of the Apache James server [1]. The impact is particularly severe because the deserialization happens before authentication checks, bypassing any access controls on the JMX endpoint [1].
Users are advised to upgrade to Apache James version 3.7.5 or 3.8.0 or later, which contain fixes for this vulnerability. If upgrade is not immediately possible, running Apache James isolated from other processes (e.g., in a dedicated container or virtual machine) or turning off the JMX endpoint entirely are recommended mitigations [1]. The vendor also notes that using a Docker container or dedicated VM can limit the exposure of the local JMX endpoint.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.james:james-serverMaven | < 3.7.5 | 3.7.5 |
org.apache.james:james-serverMaven | >= 3.8.0, < 3.8.1 | 3.8.1 |
Affected products
2- Apache Software Foundation/Apache James serverv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-px7w-c9gw-7gj3ghsaADVISORY
- lists.apache.org/thread/wbdm61ch6l0kzjn6nnfmyqlng82qz0orghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2023-51518ghsaADVISORY
News mentions
0No linked articles in our index yet.