A flaw was found in the json payload. If annotation based security is used to secure a REST resource, the JSON body that the resource may consume is being processed (deserialized) prior to the security constraints being evaluated and applied. This does not happen with configuration based security.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0298 A flaw was found in the json payload. If annotation based security is used to secure a REST resource, the JSON body that the resource may consume is being processed (deserialized) prior to the security constraints being evaluated and applied. This does not happen with configuration based security.
Github GHSA Github GHSA GHSA-8j3x-w35r-rw4r Quarkus Improper Handling of Insufficient Permissions or Privileges and Improper Handling of Exceptional Conditions vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 18 Jun 2025 07:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Dec 2024 00:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-502

Sun, 24 Nov 2024 21:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-280

Sat, 23 Nov 2024 01:00:00 +0900

Type Values Removed Values Added
Weaknesses CWE-502

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-20T07:08:53.747Z

Reserved: 2023-11-23T06:34:22.287Z

Link: CVE-2023-6267

cve-icon Vulnrichment

Updated: 2024-08-02T08:28:20.364Z

cve-icon NVD

Status : Modified

Published: 2024-01-25T19:15:08.260

Modified: 2024-12-04T08:15:05.740

Link: CVE-2023-6267

cve-icon Redhat

Severity : Important

Publid Date: 2024-01-24T00:00:00Z

Links: CVE-2023-6267 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses