Org.wildfly.core:wildfly-server: wildfly improper rbac permission
Description
A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2025-23367: In WildFly, the RBAC provider fails to enforce authorization for Suspend/Resume handlers, letting users with Monitor/Auditor roles suspend the server.
Vulnerability
Description A flaw in WildFly’s Role Based Access Control (RBAC) provider allows users assigned the Monitor or Auditor roles—which are intended to grant only read-only access—to suspend or resume the management server. The root cause is that the Suspend and Resume management operation handlers do not perform authorization checks to verify the current user has the required permissions before executing the action [1].
Exploitation
To exploit this vulnerability, an attacker must first have valid credentials for a WildFly user account that has been granted the Monitor or Auditor role. The attacker can then send a management operation request to suspend or resume the server, which the handler will process without verifying that the user has the necessary write-level authorization. No additional privileges or network position beyond access to the management interface are required [2].
Impact
A successful attack can lead to a denial-of-service condition, as an unauthorized user can suspend the WildFly server, making it unavailable to serve applications. Conversely, a user could resume a suspended server, possibly interfering with intended administrative controls. The confidentiality and integrity of the server are not directly compromised [3][4].
Mitigation
Red Hat has released security updates (RHSA-2025:3465, RHSA-2025:3989, RHSA-2025:3990, and RHSA-2025:4550) for various affected products, including Red Hat Enterprise Linux and Red Hat Single Sign-On. Administrators should apply the updates to ensure proper authorization checks are performed on the Suspend and Resume handlers. There are no known workarounds; upgrading to the fixed versions is the recommended course of action [1][2][3][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.wildfly.core:wildfly-serverMaven | < 27.0.1.Final | 27.0.1.Final |
org.wildfly.core:wildfly-serverMaven | >= 28.0.0.Beta1, < 28.0.0.Beta2 | 28.0.0.Beta2 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- access.redhat.com/errata/RHSA-2025:3465ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2025:3467ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2025:3989ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2025:3990ghsavendor-advisoryx_refsource_REDHATWEB
- access.redhat.com/errata/RHSA-2025:3992ghsavendor-advisoryx_refsource_REDHATWEB
- github.com/advisories/GHSA-qr6x-62gq-4ccpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-23367ghsaADVISORY
- access.redhat.com/errata/RHSA-2025:4548ghsaWEB
- access.redhat.com/errata/RHSA-2025:4549ghsaWEB
- access.redhat.com/errata/RHSA-2025:4550ghsaWEB
- access.redhat.com/errata/RHSA-2025:4552ghsaWEB
- access.redhat.com/security/cve/CVE-2025-23367ghsavdb-entryx_refsource_REDHATWEB
- bugzilla.redhat.com/show_bug.cgighsaissue-trackingx_refsource_REDHATWEB
- github.com/wildfly/wildfly-core/security/advisories/GHSA-qr6x-62gq-4ccpghsaWEB
News mentions
0No linked articles in our index yet.