CVE-2025-10492: JasperReports JRLoader Remote Code Execution
CVE Information
CVE ID: CVE-2025-10492
Aliases: ZDI-25-948, ZDI-CAN-27130
Severity: HIGH
CVSS v3.1: 7.2, AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Affected Vendor: Jaspersoft
Affected Product: JasperReports
Vulnerability Type: Deserialization of Untrusted Data leading to Remote Code Execution
Vulnerability Details
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Jaspersoft JasperReports. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.
The specific flaw exists within the JRLoader class. The issue results from the lack of proper
validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can
leverage this vulnerability to execute code in the context of the service account.
Additional Details
Jaspersoft has issued an update to correct this vulnerability. More details can be found at: Jaspersoft Security Advisory.
Disclosure Timeline
- 2025-06-10 - Vulnerability reported to vendor
- 2025-10-07 - Coordinated public release of advisory
- 2025-10-07 - Advisory Updated
References
This research was conducted by the ZDaylabs security team as part of our ongoing commitment to improving application security.
← Back to Research