This is an automated email from the ASF dual-hosted git repository.

pkarwasz pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/commons-text.git


The following commit(s) were added to refs/heads/master by this push:
     new c0599f43 fix: Replace Text -> Lang in VEX description
c0599f43 is described below

commit c0599f43b6a84e8ae7e1cea10e082ac2657fb647
Author: Piotr P. Karwasz <[email protected]>
AuthorDate: Mon Aug 4 14:31:22 2025 +0200

    fix: Replace Text -> Lang in VEX description
    
    The vulnerability is exploitable if a vulnerable Commons Lang is present, 
not Commons Text.
---
 src/conf/security/VEX.cyclonedx.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/conf/security/VEX.cyclonedx.xml 
b/src/conf/security/VEX.cyclonedx.xml
index 9c0875aa..dcad061f 100644
--- a/src/conf/security/VEX.cyclonedx.xml
+++ b/src/conf/security/VEX.cyclonedx.xml
@@ -67,7 +67,7 @@
         <detail>
           CVE-2025-48924 is exploitable in Apache Commons Text versions 1.5 
and later, but only when all the following conditions are met:
 
-          * The consuming project includes a vulnerable version of Commons 
Text on the classpath.
+          * The consuming project includes a vulnerable version of Commons 
Lang on the classpath.
             As of version `1.14.1`, Commons Text no longer references a 
vulnerable version of the `commons-lang3` library in its POM file.
           * Unvalidated or unsanitized user input is passed to the 
`StringSubstitutor` or `StringLookup` classes.
           * An interpolator lookup created via 
`StringLookupFactory.interpolatorLookup()` is used.

Reply via email to