Cross-site scripting in REST Management Interface in Payara Server <4.1.2.191.54, <5.83.0, <6.34.0, <7.2026.1 allows an attacker to mislead the administrator to change the admin password via URL Payload.
History

Wed, 18 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 13:45:00 +0000

Type Values Removed Values Added
Description Cross-site scripting in REST Management Interface in Payara Server <4.1.2.191.54, <5.83.0, <6.34.0, <7.2026.1 allows an attacker to mislead the administrator to change the admin password via URL Payload.
Title Admin Account Takeover via malicious URL payload
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/S:P/AU:N/R:U/RE:M/U:Red'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Payara

Published: 2026-02-18T13:39:11.316Z

Updated: 2026-02-18T14:09:59.632Z

Reserved: 2025-12-09T14:07:13.242Z

Link: CVE-2025-14340

cve-icon Vulnrichment

Updated: 2026-02-18T14:09:54.258Z

cve-icon NVD

Status : Received

Published: 2026-02-18T14:16:00.970

Modified: 2026-02-18T14:16:00.970

Link: CVE-2025-14340

cve-icon Redhat

No data.