Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.cxf/cxf-rt-frontend-jaxrs@3.3.4
purl pkg:maven/org.apache.cxf/cxf-rt-frontend-jaxrs@3.3.4
Next non-vulnerable version 3.3.10
Latest non-vulnerable version 3.4.3
Risk 4.0
Vulnerabilities affecting this package (2)
Vulnerability Summary Fixed by
VCID-darq-bg13-x3fd
Aliases:
CVE-2020-13954
GHSA-64x2-gq24-75pv
Cross-site scripting in Apache CXF By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573.
3.3.8
Affected by 1 other vulnerability.
3.4.1
Affected by 1 other vulnerability.
VCID-x3q1-vymh-jkew
Aliases:
CVE-2021-22696
GHSA-7q4h-pj78-j7vg
Authorization service vulnerable to DDos attacks in Apache CFX CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10.
3.3.10
Affected by 0 other vulnerabilities.
3.4.3
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T21:20:08.989863+00:00 GitLab Importer Affected by VCID-x3q1-vymh-jkew https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf-rt-frontend-jaxrs/CVE-2021-22696.yml 38.4.0
2026-04-16T21:13:48.380413+00:00 GitLab Importer Affected by VCID-darq-bg13-x3fd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf-rt-frontend-jaxrs/CVE-2020-13954.yml 38.4.0
2026-04-11T22:32:29.514074+00:00 GitLab Importer Affected by VCID-x3q1-vymh-jkew https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf-rt-frontend-jaxrs/CVE-2021-22696.yml 38.3.0
2026-04-11T22:25:54.567032+00:00 GitLab Importer Affected by VCID-darq-bg13-x3fd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf-rt-frontend-jaxrs/CVE-2020-13954.yml 38.3.0
2026-04-02T22:43:44.163342+00:00 GitLab Importer Affected by VCID-x3q1-vymh-jkew https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf-rt-frontend-jaxrs/CVE-2021-22696.yml 38.1.0
2026-04-02T22:37:41.071465+00:00 GitLab Importer Affected by VCID-darq-bg13-x3fd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf-rt-frontend-jaxrs/CVE-2020-13954.yml 38.1.0
2026-04-01T17:01:30.574707+00:00 GitLab Importer Affected by VCID-x3q1-vymh-jkew https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf-rt-frontend-jaxrs/CVE-2021-22696.yml 38.0.0
2026-04-01T16:55:01.186271+00:00 GitLab Importer Affected by VCID-darq-bg13-x3fd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf-rt-frontend-jaxrs/CVE-2020-13954.yml 38.0.0