Adobe Security Bulletin

Security updates available for Adobe ColdFusion | APSB25-69

Bulletin ID

Date Published

Priority

APSB25-69

July 8, 2025

1

Summary

Adobe has released security updates for ColdFusion versions 2025, 2023 and 2021. These updates resolve criticalimportant and moderate vulnerabilities that could lead to arbitrary file system read, arbitrary code execution, privilege escalation, security feature bypass and application denial-of-service.

 Adobe is not aware of any exploits in the wild for any of the issues addressed in these updates.

Affected Versions

Product

Update number

Platform

ColdFusion 2025

Update 2 and earlier versions

All

ColdFusion 2023

Update 14 and earlier versions
  

All

ColdFusion 2021

Update 20 and earlier versions

All

Solution

Adobe categorizes these updates with the following priority rating and recommends users update their installations to the newest versions:

Product

Updated Version

Platform

Priority rating

Availability

ColdFusion 2025

Update 3

All

1

ColdFusion 2023

Update 15

All

1

ColdFusion 2021

Update 21

All

1

Note:

For security reasons, we strongly recommend to use latest mysql java connector. For more information on its usage, please  refer to https://helpx.adobe.com/coldfusion/kb/coldfusion-configuring-mysql-jdbc.html

See the updated serial filter documentation for more details on protection against insecure Wddx deserialization attacks https://helpx.adobe.com/coldfusion/kb/coldfusion-serialfilter-file.html

Vulnerability Details

Vulnerability Category

Vulnerability Impact

Severity

CVSS base score 

CVE Numbers

Improper Restriction of XML External Entity Reference ('XXE') (CWE-611)

Arbitrary file system read

Critical

9.3

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L

CVE-2025-49535

Use of Hard-coded Credentials (CWE-798)

Privilege escalation

Critical

8.8

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2025-49551

Incorrect Authorization (CWE-863)

Security feature bypass

Critical

8.1

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

CVE-2025-49536

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)

Arbitrary file system read

Critical

8.1

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

CVE-2025-49537

XML Injection (aka Blind XPath Injection) (CWE-91)

Arbitrary file system read

Critical

7.4

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H

CVE-2025-49538

Improper Restriction of XML External Entity Reference ('XXE') (CWE-611)

Security feature bypass

Important

6.5

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CVE-2025-49539

Cross-site Scripting (Stored XSS) (CWE-79)

Arbitrary code execution

Important

4.8

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

CVE-2025-49540

Cross-site Scripting (Stored XSS) (CWE-79)

Arbitrary code execution

Important

4.8

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

CVE-2025-49541

Cross-site Scripting (Stored XSS) (CWE-79)

Arbitrary code execution

Important

6.1

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVE-2025-49542

Cross-site Scripting (Stored XSS) (CWE-79)

Arbitrary code execution

Important

4.8

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

CVE-2025-49543

Improper Restriction of XML External Entity Reference ('XXE') (CWE-611)

Security feature bypass

Important

6.8

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

CVE-2025-49544

Server-Side Request Forgery (SSRF) (CWE-918)

Arbitrary file system read

Important

6.8

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

CVE-2025-49545

Improper Access Control (CWE-284)

Application denial-of-service

Moderate

2.7

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L

CVE-2025-49546

Acknowledgements:

Adobe would like to thank the following researchers for reporting this issue and for working with Adobe to help protect our customers:   

  • anonymous_blackzero - CVE-2025-49536, CVE-2025-49542, CVE-2025-49543, CVE-2025-49544
  • nbxiglk - CVE-2025-49535, CVE-2025-49537, CVE-2025-49551
  • Brian Reilly (reillyb) - CVE-2025-49539, CVE-2025-49545
  • the_predator - CVE-2025-49540, CVE-2025-49541
  • Ashish Dhone (ashketchum) - CVE-2025-49546
  • Nhien Pham (nhienit2010) - CVE-2025-49538

NOTE: Adobe has a public bug bounty program with HackerOne. If you are interested in working with Adobe as an external security researcher, please check out https://hackerone.com/adobe

Note:

Adobe recommends updating your ColdFusion JDK/JRE LTS version to the latest update release as a secure practice. The ColdFusion downloads page is regularly updated to include the latest Java installers for the JDK version your installation supports as per the matrices below. 

For instructions on how to use an external JDK, view Change ColdFusion JVM

Adobe also recommends applying the security configuration settings included in the ColdFusion Security documentation as well as review the respective Lockdown guides.    

ColdFusion JDK Requirement

COLDFUSION 2025 (version 2023.0.0.331385) and above
For Application Servers

On JEE installations, set the following JVM flag, “-Djdk.serialFilter= !org.mozilla.**;!com.sun.syndication.**;!org.apache.commons.beanutils.**;!org.jgroups.**;!com.sun.rowset.**; !com.mysql.cj.jdbc.interceptors.**;!org.apache.commons.collections.**; " in the respective startup file depending on the type of Application Server being used.

For example:
Apache Tomcat Application Server: edit JAVA_OPTS in the ‘Catalina.bat/sh’ file
WebLogic Application Server: edit JAVA_OPTIONS in the ‘startWeblogic.cmd’ file
WildFly/EAP Application Server: edit JAVA_OPTS in the ‘standalone.conf’ file
Set the JVM flags on a JEE installation of ColdFusion, not on a standalone installation.

 

COLDFUSION 2023 (version 2023.0.0.330468) and above
For Application Servers

On JEE installations, set the following JVM flag, “-Djdk.serialFilter= !org.mozilla.**;!com.sun.syndication.**;!org.apache.commons.beanutils.**;!org.jgroups.**;!com.sun.rowset.**; !com.mysql.cj.jdbc.interceptors.**;!org.apache.commons.collections.**;" in the respective startup file depending on the type of Application Server being used.

For example:
Apache Tomcat Application Server: edit JAVA_OPTS in the ‘Catalina.bat/sh’ file
WebLogic Application Server: edit JAVA_OPTIONS in the ‘startWeblogic.cmd’ file
WildFly/EAP Application Server: edit JAVA_OPTS in the ‘standalone.conf’ file
Set the JVM flags on a JEE installation of ColdFusion, not on a standalone installation.

 

COLDFUSION 2021 (version 2021.0.0.323925) and above

For Application Servers   

On JEE installations, set the following JVM flag, “-Djdk.serialFilter= !org.mozilla.**;!com.sun.syndication.**;!org.apache.commons.beanutils.**;!org.jgroups.**;!com.sun.rowset.**; !com.mysql.cj.jdbc.interceptors.**;!org.apache.commons.collections.**;"

in the respective startup file depending on the type of Application Server being used.

For example:   

Apache Tomcat Application Server: edit JAVA_OPTS in the ‘Catalina.bat/sh’ file   

WebLogic Application Server:  edit JAVA_OPTIONS in the ‘startWeblogic.cmd’ file   

WildFly/EAP Application Server:  edit JAVA_OPTS in the ‘standalone.conf’ file   

Set the JVM flags on a JEE installation of ColdFusion, not on a standalone installation.   


For more information, visit https://helpx.adobe.com/security.html , or email PSIRT@adobe.com 

Get help faster and easier

New user?