So, for Commons Compress for example, like this:
{
"@context": "https://openvex.dev/ns/v0.2.0",
"id": "https://apache.org/vex/statement-commons-compress-001",
"author": "apache.org",
"role": "Document Creator",
"timestamp": "2025-07-23T11:11:00Z",
"version": 1,
"statements": [
{
"vulnerability": {
"name": "CVE-2025-48924"
},
"products": [
"pkg:maven/org.apache.commons/[email protected]"
],
"status": "not_affected",
"justification": "vulnerable_code_not_in_execute_path",
"timestamp": "2025-07-23T11:11:00Z"
}
]
}
?
Gary
On Sun, Jul 20, 2025 at 5:23 PM Piotr P. Karwasz <[email protected]>
wrote:
> Hi all,
>
> As you know, we released CVE-2025-48924 for Commons Lang a few days ago.
> Due to the widespread use of the library, the CVE has already triggered
> some user responses: for example, in [1], users reported being forced to
> upgrade Commons Lang and remove deprecated method usage due to internal
> policy.
>
> I'd like to propose publishing an **experimental** Vulnerability
> Exploitability eXchange (VEX) file for the Apache Commons components. A
> VEX file is a machine-readable document that assesses the
> **exploitability** of a known vulnerability in the context of a specific
> product or environment.
>
> While VEX was originally designed for complete applications, I believe
> we can use it in an experimental capacity for libraries to clarify the
> impact of vulnerabilities such as this one. For instance:
>
> * Although Commons Compress depends on Commons Lang [2], the affected
> `ClassUtils` class is **not** reachable through Commons Compress.
> * Conversely, other Commons components might expose or transitively
> allow exploitation of the vulnerability.
>
> I'm currently involved in maintaining Apache Solr's VEX file [3], and
> would be happy to take the lead on maintaining one for Commons as well.
>
> ### VEX Files for Libraries: Why "Experimental"?
>
> I've used the term “experimental” deliberately. VEX files are typically
> phrased like this:
>
> "This component contains CVE-XXXX-YYYY but is not **exploitable**
> in this product."
>
> But in our case, what we'd want to express is closer to:
>
> "Even if an application includes both Commons Foo and a vulnerable
> Commons Lang, the vulnerability *may* or *may not* be exploitable
> *through* Commons Foo."
>
> That distinction makes VEX for libraries a bit of a stretch, but
> potentially still valuable for downstream users and security tooling.
>
> Thoughts?
>
> Best,
> Piotr
>
> References:
> [1] https://lists.apache.org/thread/15trh8n443s4rnmtj95oh0vlbb8dr2h1
> [2] https://lists.apache.org/thread/qrdg69njp87fgwf09qfdbm94hytm7mh7
> [3] https://lists.apache.org/thread/8yzoyn4xxy25x9thd7bcq1cz5soj619q
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [email protected]
> For additional commands, e-mail: [email protected]
>
>