[Snyk] Security upgrade org.apache.poi:poi-ooxml from 5.2.5 to 5.4.0#9953
[Snyk] Security upgrade org.apache.poi:poi-ooxml from 5.2.5 to 5.4.0#9953
Conversation
The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEPOI-9685010
This comment has been minimized.
This comment has been minimized.
📦 Vulnerable Dependencies✍️ Summary
🔬 Research Details[ CVE-2024-52046 ] org.apache.mina:mina-core 2.0.7Description: This issue affects MINA core versions 2.0.X, 2.1.X and 2.2.X, and will be fixed by the releases 2.0.27, 2.1.10 and 2.2.4. It's also important to note that an application using MINA core library will only be affected if the IoBuffer#getObject() method is called, and this specific method is potentially called when adding a ProtocolCodecFilter instance using the ObjectSerializationCodecFactory class in the filter chain. If your application is specifically using those classes, you have to upgrade to the latest version of MINA core library. Upgrading will not be enough: you also need to explicitly allow the classes the decoder will accept in the ObjectSerializationDecoder instance, using one of the three new methods: * Accept class names where the supplied ClassNameMatcher matches for By defa... [ CVE-2022-45047 ] org.apache.sshd:sshd-core 0.11.0Description: When creating a SSH server with Apache MINA SSHD, a To exploit this issue, an attacker must find a way to upload a malicious file that the application will pass to the Example of vulnerable code: An attacker controlling the Remediation: Development mitigationsGenerate host key file in OpenSSH format and load them replacing the use of SimpleGeneratorHostKeyProvider by FileKeyPairProvider as follows: or use a custom implementation of SimpleGeneratorHostKeyProvider as following: [ CVE-2016-1000027 ] org.springframework:spring-web 5.3.39Description: Remediation: Deployment mitigationsDo not use Java serialization for external endpoints (Do not extend the [ CVE-2019-0231 ] org.apache.mina:mina-core 2.0.7Description: [ CVE-2025-27533 ] org.apache.activemq:activemq-openwire-legacy 5.18.4Description: During unmarshalling of OpenWire commands the size value of buffers was not properly validated which could lead to excessive memory allocation and be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on the availability of the ActiveMQ broker when not using mutual TLS connections. Users are recommended to upgrade to version 6.1.6+, 5.19.0+, 5.18.7+, 5.17.7, or 5.16.8 or which fixes the issue. Existing users may implement mutual TLS to mitigate the risk on affected brokers. [ CVE-2025-27533 ] org.apache.activemq:activemq-client 5.18.4Description: During unmarshalling of OpenWire commands the size value of buffers was not properly validated which could lead to excessive memory allocation and be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that rely on the availability of the ActiveMQ broker when not using mutual TLS connections. Users are recommended to upgrade to version 6.1.6+, 5.19.0+, 5.18.7+, 5.17.7, or 5.16.8 or which fixes the issue. Existing users may implement mutual TLS to mitigate the risk on affected brokers. [ CVE-2022-41404 ] org.ini4j:ini4j 0.5.4Description: [ CVE-2026-0603 ] org.hibernate:hibernate-core 5.4.24.FinalDescription: [ CVE-2025-41249 ] org.springframework:spring-core 5.3.39Description: The core of the vulnerability lies in how the Spring Framework's The most significant impact of this vulnerability is the potential for authorization bypass in applications that use Spring Security's For example, a developer might place a security annotation like Vulnerable code example: 1ue@qq.com>\r\nRCPT TO:phising-victim@qq.com\r\nDATA\r\nSubject:PWNED\r\n\r\nHack!\r\n.\r\nQUIT\r\n SslContext context = ...; SslContext context = ...; |
❌ Build failed in 43m 22sBuild command: mvn clean verify -B -e -Daudit -Djs.no.sandbox -pl plugins❗ No tests found!ℹ️ This is an automatic message |

0 New Issues
0 Fixed Issues
0 Accepted Issues
No data about coverage




Snyk has created this PR to fix 1 vulnerabilities in the maven dependencies of this project.
Snyk changed the following file(s):
plugins/pom.xmlVulnerabilities that will be fixed with an upgrade:
SNYK-JAVA-ORGAPACHEPOI-9685010
5.2.5->5.4.0No Known ExploitImportant
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Improper Input Validation