Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.richfaces/richfaces-core
  4. ›
  5. CVE-2018-14667

CVE-2018-14667: Richfaces vulnerable to arbitrary code execution

May 13, 2022 (updated October 22, 2025)

The RichFaces Framework 3.X through 3.3.4 is vulnerable to Expression Language (EL) injection via the UserResource resource. A remote, unauthenticated attacker could exploit this to execute arbitrary code using a chain of java serialized objects via org.ajax4jsf.resource.UserResource$UriData.

References

  • access.redhat.com/errata/RHSA-2018:3517
  • access.redhat.com/errata/RHSA-2018:3518
  • access.redhat.com/errata/RHSA-2018:3519
  • access.redhat.com/errata/RHSA-2018:3581
  • bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14667
  • github.com/advisories/GHSA-j7mw-7crr-658v
  • github.com/richfaces/richfaces/commit/1372eb716c1a215a5af124198f21bde33fafad06
  • nvd.nist.gov/vuln/detail/CVE-2018-14667
  • www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-14667

Code Behaviors & Features

Detect and mitigate CVE-2018-14667 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.3.4

Fixed versions

  • 3.3.4

Solution

Upgrade to version 3.3.4 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

maven/org.richfaces/richfaces-core/CVE-2018-14667.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 02 Nov 2025 12:18:24 +0000.