We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-23215

PMD Designer's release key passphrase (GPG) available on Maven Central in cleartext



Description

PMD is an extensible multilanguage static code analyzer. The passphrase for the PMD and PMD Designer release signing keys are included in jar published to Maven Central. The private key itself is not known to have been compromised itself, but given its passphrase is, it must also be considered potentially compromised. As a mitigation, both compromised keys have been revoked so that no future use of the keys are possible. Note, that the published artifacts in Maven Central under the group id net.sourceforge.pmd are not compromised and the signatures are valid.

Reserved 2025-01-13 | Published 2025-01-31 | Updated 2025-01-31 | Assigner GitHub_M

Problem types

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

CWE-540: Inclusion of Sensitive Information in Source Code

CWE-312: Cleartext Storage of Sensitive Information

Product status

< 7.10.0
affected

References

github.com/pmd/pmd/security/advisories/GHSA-88m4-h43f-wx84

github.com/...ommit/1548f5f27ba2981b890827fecbd0612fa70a0362

github.com/...ommit/e87a45312753ec46b3e5576c6f6ac1f7de2f5891

cve.org (CVE-2025-23215)

nvd.nist.gov (CVE-2025-23215)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2025-23215

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.