CVE-2025-46551

JRuby-OpenSSL is an add-on gem for JRuby that emulates the Ruby OpenSSL native library. Starting in JRuby-OpenSSL version 0.12.1 and prior to version 0.15.4 (corresponding to JRuby versions starting in 9.3.4.0 prior to 9.4.12.1 and 10.0.0.0 prior to 10.0.0.1), when verifying SSL certificates, JRuby-OpenSSL does not verify that the hostname presented in the certificate matches the one the user tries to connect to. This means a man-in-the-middle could just present any valid cert for a completely different domain they own, and JRuby would accept the cert. Anybody using JRuby to make requests of external APIs, or scraping the web, that depends on https to connect securely. JRuby-OpenSSL version 0.15.4 contains a fix for the issue. This fix is included in JRuby versions 10.0.0.1 and 9.4.12.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:jruby:jruby:*:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:10.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby-openssl:*:*:*:*:*:*:*:*

History

21 Oct 2025, 15:36

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 3.7
References () https://github.com/jruby/jruby-openssl/commit/31a56d690ce9b8af47af09aaaf809081949ed285 - () https://github.com/jruby/jruby-openssl/commit/31a56d690ce9b8af47af09aaaf809081949ed285 - Patch
References () https://github.com/jruby/jruby-openssl/security/advisories/GHSA-72qj-48g4-5xgx - () https://github.com/jruby/jruby-openssl/security/advisories/GHSA-72qj-48g4-5xgx - Exploit, Vendor Advisory
First Time Jruby jruby-openssl
Jruby
Jruby jruby
CPE cpe:2.3:a:jruby:jruby-openssl:*:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:*:*:*:*:*:*:*:*
cpe:2.3:a:jruby:jruby:10.0.0.0:*:*:*:*:*:*:*

08 May 2025, 14:39

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-07 17:15

Updated : 2025-10-21 15:36


NVD link : CVE-2025-46551

Mitre link : CVE-2025-46551

CVE.ORG link : CVE-2025-46551


JSON object : View

Products Affected

jruby

  • jruby
  • jruby-openssl
CWE
CWE-295

Improper Certificate Validation