Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.cxf/cxf@3.2.13
purl pkg:maven/org.apache.cxf/cxf@3.2.13
Next non-vulnerable version 3.4.10
Latest non-vulnerable version 3.5.5
Risk 4.5
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-darq-bg13-x3fd
Aliases:
CVE-2020-13954
GHSA-64x2-gq24-75pv
Cross-site scripting in Apache CXF By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573.
3.3.8
Affected by 3 other vulnerabilities.
3.4.1
Affected by 3 other vulnerabilities.
VCID-fekg-fn5e-augk
Aliases:
CVE-2020-1954
GHSA-ffm7-7r8g-77xm
Exposure of Sensitive Information to an Unauthorized Actor in Apache CXF Apache CXF has the ability to integrate with JMX by registering an InstrumentationManager extension with the CXF bus. If the ‘createMBServerConnectorFactory‘ property of the default InstrumentationManagerImpl is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same host can connect to the registry and rebind the entry to another server, thus acting as a proxy to the original. They are then able to gain access to all of the information that is sent and received over JMX.
3.3.6
Affected by 4 other vulnerabilities.
VCID-x3q1-vymh-jkew
Aliases:
CVE-2021-22696
GHSA-7q4h-pj78-j7vg
Authorization service vulnerable to DDos attacks in Apache CFX CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve a JWT token from via the "request_uri" parameter. CXF was not validating the "request_uri" parameter (apart from ensuring it uses "https) and was making a REST request to the parameter in the request to retrieve a token. This means that CXF was vulnerable to DDos attacks on the authorization server, as specified in section 10.4.1 of the spec. This issue affects Apache CXF versions prior to 3.4.3; Apache CXF versions prior to 3.3.10.
3.3.10
Affected by 2 other vulnerabilities.
3.4.3
Affected by 2 other vulnerabilities.
VCID-xzs8-rbhd-mkbp
Aliases:
CVE-2022-46363
GHSA-3w37-5p3p-jv92
Apache CXF vulnerable to Exposure of Sensitive Information A vulnerability in Apache CXF before versions 3.5.5 and 3.4.10 allows an attacker to perform a remote directory listing or code exfiltration. The vulnerability only applies when the CXFServlet is configured with both the static-resources-list and redirect-query-check attributes. These attributes are not supposed to be used together, and so the vulnerability can only arise if the CXF service is misconfigured.
3.4.10
Affected by 0 other vulnerabilities.
3.5.5
Affected by 0 other vulnerabilities.
VCID-y8up-mkx2-abcn
Aliases:
CVE-2022-46364
GHSA-x3x3-qwjq-8gj4
Apache CXF Server-Side Request Forgery vulnerability A SSRF vulnerability in parsing the href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.
3.4.10
Affected by 0 other vulnerabilities.
3.5.5
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T22:18:04.611762+00:00 GitLab Importer Affected by VCID-xzs8-rbhd-mkbp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2022-46363.yml 38.4.0
2026-04-16T22:17:57.629709+00:00 GitLab Importer Affected by VCID-y8up-mkx2-abcn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2022-46364.yml 38.4.0
2026-04-16T21:39:57.945133+00:00 GitLab Importer Affected by VCID-fekg-fn5e-augk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2020-1954.yml 38.4.0
2026-04-16T21:20:06.515752+00:00 GitLab Importer Affected by VCID-x3q1-vymh-jkew https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2021-22696.yml 38.4.0
2026-04-16T21:13:49.069264+00:00 GitLab Importer Affected by VCID-darq-bg13-x3fd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2020-13954.yml 38.4.0
2026-04-11T23:35:36.034811+00:00 GitLab Importer Affected by VCID-xzs8-rbhd-mkbp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2022-46363.yml 38.3.0
2026-04-11T23:35:27.580199+00:00 GitLab Importer Affected by VCID-y8up-mkx2-abcn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2022-46364.yml 38.3.0
2026-04-11T22:55:13.045539+00:00 GitLab Importer Affected by VCID-fekg-fn5e-augk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2020-1954.yml 38.3.0
2026-04-11T22:32:26.579972+00:00 GitLab Importer Affected by VCID-x3q1-vymh-jkew https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2021-22696.yml 38.3.0
2026-04-11T22:25:55.313241+00:00 GitLab Importer Affected by VCID-darq-bg13-x3fd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2020-13954.yml 38.3.0
2026-04-02T23:40:12.771504+00:00 GitLab Importer Affected by VCID-xzs8-rbhd-mkbp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2022-46363.yml 38.1.0
2026-04-02T23:40:05.871718+00:00 GitLab Importer Affected by VCID-y8up-mkx2-abcn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2022-46364.yml 38.1.0
2026-04-02T23:04:16.080269+00:00 GitLab Importer Affected by VCID-fekg-fn5e-augk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2020-1954.yml 38.1.0
2026-04-02T22:43:41.704833+00:00 GitLab Importer Affected by VCID-x3q1-vymh-jkew https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2021-22696.yml 38.1.0
2026-04-02T22:37:41.925149+00:00 GitLab Importer Affected by VCID-darq-bg13-x3fd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2020-13954.yml 38.1.0
2026-04-01T18:02:43.715546+00:00 GitLab Importer Affected by VCID-xzs8-rbhd-mkbp https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2022-46363.yml 38.0.0
2026-04-01T18:02:35.802498+00:00 GitLab Importer Affected by VCID-y8up-mkx2-abcn https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2022-46364.yml 38.0.0
2026-04-01T17:23:15.425632+00:00 GitLab Importer Affected by VCID-fekg-fn5e-augk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2020-1954.yml 38.0.0
2026-04-01T17:01:27.748406+00:00 GitLab Importer Affected by VCID-x3q1-vymh-jkew https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2021-22696.yml 38.0.0
2026-04-01T16:55:01.930418+00:00 GitLab Importer Affected by VCID-darq-bg13-x3fd https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.cxf/cxf/CVE-2020-13954.yml 38.0.0