Apache Commons Text versions prior to 1.10.0 included interpolation features that could be abused when applications passed untrusted input into the te...
Description
Apache Commons Text versions prior to 1.10.0 included interpolation features that could be abused when applications passed untrusted input into the text-substitution API. Because some interpolators could trigger actions like executing commands or accessing external resources, an attacker could potentially achieve remote code execution. This vulnerability has been fully addressed in FileMaker Server 22.0.4.
AI Analyst Comment
Remediation
Update Apache Commons Text versions prior to Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical remote code execution vulnerability exists in multiple versions of the widely-used Apache Commons Text library. An attacker can exploit this flaw by sending specially crafted input to an application using the vulnerable library, allowing them to execute arbitrary commands and completely compromise the underlying system. Due to the library's widespread use and the simplicity of exploitation, this vulnerability poses a severe and immediate risk to affected organizations.
Vulnerability Details
CVE-ID: CVE-2025-46295
Affected Software: Apache Commons Text versions prior to Multiple Products
Affected Versions: Apache Commons Text versions prior to 1.10.0
Vulnerability: The vulnerability lies within the string substitution and interpolation features of the Apache Commons Text library. The library includes special "lookups" that can be triggered using the
${prefix:key}syntax. When an application passes untrusted user input to a function that performs this substitution, an attacker can use prefixes likescript,dns, orurlto execute arbitrary scripts, perform DNS lookups, or make network requests. A malicious actor can craft a payload such as${script:javascript:java.lang.Runtime.getRuntime().exec('command')}to achieve remote code execution on the server running the vulnerable application.Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could lead to a complete compromise of the affected server's confidentiality, integrity, and availability. An attacker could exfiltrate sensitive data, disrupt critical services, install persistent backdoors or ransomware, and use the compromised system as a pivot point to move laterally within the corporate network. The widespread use of the Apache Commons Text library means numerous applications may be unknowingly exposed, posing a significant risk of data breaches, financial loss, and reputational damage.
Remediation Plan
Immediate Action: The primary remediation is to upgrade the vulnerable library. All applications using Apache Commons Text should be updated to version 1.10.0 or later, where the dangerous interpolators are disabled by default. For products that embed this library, such as FileMaker Server, apply the vendor-supplied patch (e.g., update to version 22.0.4 or newer).
Proactive Monitoring: Security teams should actively monitor for signs of exploitation. Review application and web server logs for suspicious input containing the
${prefix:lookup}pattern. Monitor for unexpected child processes being spawned by application server processes (e.g.,sh,bash,powershell,curl) and scrutinize outbound network traffic from application servers for connections to unusual IP addresses or domains.Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:
${...}patterns in user-submitted data.Exploitation Status
Public Exploit Available: true
Analyst Notes: As of Dec 16, 2025, multiple public proof-of-concept (PoC) exploits are available for this vulnerability. Given the critical severity and ease of exploitation, widespread scanning and active exploitation by threat actors are highly likely. While this vulnerability is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its status could change rapidly as exploitation becomes more prevalent.
Analyst Recommendation
Due to the critical CVSS score of 9.8 and the availability of public exploits, this vulnerability requires immediate attention. We strongly recommend that all system owners identify and patch affected applications without delay. Prioritize patching for all internet-facing systems. In parallel, security teams should immediately implement monitoring for indicators of compromise and consider applying compensating controls like WAF rules and egress filtering to reduce the attack surface while the patching process is underway.