Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-etyq-9yys-tkdf
Vulnerability ID VCID-etyq-9yys-tkdf
Aliases CVE-2023-0482
GHSA-2c6g-pfx3-w7h8
GHSA-jrmh-v64j-mjm9
Summary Insecure Temporary File in RESTEasy In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0482.json
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2023-0482
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2023-0482
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2023-0482
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2023-0482
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2023-0482
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2023-0482
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2023-0482
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2023-0482
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2023-0482
epss 0.0005 https://api.first.org/data/v1/epss?cve=CVE-2023-0482
cvssv3.1 5.5 https://bugzilla.redhat.com/show_bug.cgi?id=2166004
generic_textual MODERATE https://bugzilla.redhat.com/show_bug.cgi?id=2166004
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-2c6g-pfx3-w7h8
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-jrmh-v64j-mjm9
cvssv3.1 5.5 https://github.com/orgs/resteasy/discussions/3415
generic_textual MODERATE https://github.com/orgs/resteasy/discussions/3415
cvssv3.1 5.5 https://github.com/orgs/resteasy/discussions/3504
generic_textual MODERATE https://github.com/orgs/resteasy/discussions/3504
cvssv3.1 5.5 https://github.com/orgs/resteasy/discussions/3506
generic_textual MODERATE https://github.com/orgs/resteasy/discussions/3506
cvssv3.1 5.5 https://github.com/resteasy/resteasy
generic_textual MODERATE https://github.com/resteasy/resteasy
cvssv3.1 5.5 https://github.com/resteasy/Resteasy
generic_textual MODERATE https://github.com/resteasy/Resteasy
cvssv3.1 5.5 https://github.com/resteasy/resteasy/pull/3409
generic_textual MODERATE https://github.com/resteasy/resteasy/pull/3409
cvssv3.1 5.5 https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56
generic_textual MODERATE https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56
ssvc Track https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56
cvssv3.1 5.5 https://github.com/resteasy/resteasy/pull/3410
generic_textual MODERATE https://github.com/resteasy/resteasy/pull/3410
cvssv3.1 5.5 https://github.com/resteasy/resteasy/pull/3412
generic_textual MODERATE https://github.com/resteasy/resteasy/pull/3412
cvssv3.1 5.5 https://github.com/resteasy/resteasy/pull/3413
generic_textual MODERATE https://github.com/resteasy/resteasy/pull/3413
cvssv3.1 5.5 https://github.com/resteasy/resteasy/pull/3423
generic_textual MODERATE https://github.com/resteasy/resteasy/pull/3423
cvssv3.1 5.5 https://github.com/resteasy/resteasy/security/advisories/GHSA-2c6g-pfx3-w7h8
cvssv3.1_qr MODERATE https://github.com/resteasy/resteasy/security/advisories/GHSA-2c6g-pfx3-w7h8
generic_textual MODERATE https://github.com/resteasy/resteasy/security/advisories/GHSA-2c6g-pfx3-w7h8
cvssv3.1 5.5 https://issues.redhat.com/browse/RESTEASY-3286
generic_textual MODERATE https://issues.redhat.com/browse/RESTEASY-3286
cvssv3.1 5.5 https://nvd.nist.gov/vuln/detail/CVE-2023-0482
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2023-0482
cvssv3.1 5.5 https://security.netapp.com/advisory/ntap-20230427-0001
generic_textual MODERATE https://security.netapp.com/advisory/ntap-20230427-0001
cvssv3.1 5.5 https://security.netapp.com/advisory/ntap-20230427-0001/
ssvc Track https://security.netapp.com/advisory/ntap-20230427-0001/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0482.json
https://api.first.org/data/v1/epss?cve=CVE-2023-0482
https://bugzilla.redhat.com/show_bug.cgi?id=2166004
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0482
https://github.com/orgs/resteasy/discussions/3415
https://github.com/orgs/resteasy/discussions/3504
https://github.com/orgs/resteasy/discussions/3506
https://github.com/resteasy/resteasy
https://github.com/resteasy/Resteasy
https://github.com/resteasy/resteasy/pull/3409
https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56
https://github.com/resteasy/resteasy/pull/3410
https://github.com/resteasy/resteasy/pull/3412
https://github.com/resteasy/resteasy/pull/3413
https://github.com/resteasy/resteasy/pull/3423
https://github.com/resteasy/resteasy/security/advisories/GHSA-2c6g-pfx3-w7h8
https://issues.redhat.com/browse/RESTEASY-3286
https://security.netapp.com/advisory/ntap-20230427-0001
1031728 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031728
1031729 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031729
CVE-2023-0482 https://nvd.nist.gov/vuln/detail/CVE-2023-0482
GHSA-2c6g-pfx3-w7h8 https://github.com/advisories/GHSA-2c6g-pfx3-w7h8
GHSA-jrmh-v64j-mjm9 https://github.com/advisories/GHSA-jrmh-v64j-mjm9
ntap-20230427-0001 https://security.netapp.com/advisory/ntap-20230427-0001/
RHSA-2023:2705 https://access.redhat.com/errata/RHSA-2023:2705
RHSA-2023:2706 https://access.redhat.com/errata/RHSA-2023:2706
RHSA-2023:2707 https://access.redhat.com/errata/RHSA-2023:2707
RHSA-2023:2710 https://access.redhat.com/errata/RHSA-2023:2710
RHSA-2023:2713 https://access.redhat.com/errata/RHSA-2023:2713
RHSA-2023:3185 https://access.redhat.com/errata/RHSA-2023:3185
RHSA-2023:4983 https://access.redhat.com/errata/RHSA-2023:4983
RHSA-2023:5165 https://access.redhat.com/errata/RHSA-2023:5165
RHSA-2023:6305 https://access.redhat.com/errata/RHSA-2023:6305
USN-7351-1 https://usn.ubuntu.com/7351-1/
USN-7630-1 https://usn.ubuntu.com/7630-1/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0482.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://bugzilla.redhat.com/show_bug.cgi?id=2166004
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/orgs/resteasy/discussions/3415
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/orgs/resteasy/discussions/3504
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/orgs/resteasy/discussions/3506
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/resteasy/resteasy
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/resteasy/Resteasy
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/resteasy/resteasy/pull/3409
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T16:02:39Z/ Found at https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/resteasy/resteasy/pull/3410
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/resteasy/resteasy/pull/3412
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/resteasy/resteasy/pull/3413
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/resteasy/resteasy/pull/3423
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://github.com/resteasy/resteasy/security/advisories/GHSA-2c6g-pfx3-w7h8
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://issues.redhat.com/browse/RESTEASY-3286
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2023-0482
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20230427-0001
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Found at https://security.netapp.com/advisory/ntap-20230427-0001/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-18T16:02:39Z/ Found at https://security.netapp.com/advisory/ntap-20230427-0001/
Exploit Prediction Scoring System (EPSS)
Percentile 0.15625
EPSS Score 0.0005
Published At April 2, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:50:55.026783+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jboss.resteasy/resteasy-multipart-provider/CVE-2023-0482.yml 38.0.0