Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-54ek-p545-k3fj
Vulnerability ID VCID-54ek-p545-k3fj
Aliases CVE-2020-25633
GHSA-hr32-mgpm-qf2f
Summary Generation of Error Message Containing Sensitive Information in RESTEasy client A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25633.json
epss 0.00228 https://api.first.org/data/v1/epss?cve=CVE-2020-25633
epss 0.00228 https://api.first.org/data/v1/epss?cve=CVE-2020-25633
epss 0.00228 https://api.first.org/data/v1/epss?cve=CVE-2020-25633
epss 0.00228 https://api.first.org/data/v1/epss?cve=CVE-2020-25633
epss 0.00228 https://api.first.org/data/v1/epss?cve=CVE-2020-25633
epss 0.00228 https://api.first.org/data/v1/epss?cve=CVE-2020-25633
epss 0.00228 https://api.first.org/data/v1/epss?cve=CVE-2020-25633
epss 0.00228 https://api.first.org/data/v1/epss?cve=CVE-2020-25633
epss 0.00228 https://api.first.org/data/v1/epss?cve=CVE-2020-25633
epss 0.00228 https://api.first.org/data/v1/epss?cve=CVE-2020-25633
cvssv3.1 5.3 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633
generic_textual MODERATE https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-hr32-mgpm-qf2f
cvssv3.1 5.3 https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0
generic_textual MODERATE https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0
cvssv3.1 5.3 https://issues.redhat.com/browse/RESTEASY-2820
generic_textual MODERATE https://issues.redhat.com/browse/RESTEASY-2820
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2020-25633
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2020-25633
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25633.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://issues.redhat.com/browse/RESTEASY-2820
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-25633
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.45458
EPSS Score 0.00228
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T13:02:21.533642+00:00 GithubOSV Importer Import https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/06/GHSA-hr32-mgpm-qf2f/GHSA-hr32-mgpm-qf2f.json 38.0.0