The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-23184

CVE-2025-23184: Apache CXF DOS Vulnerability

CVE-2025-23184 is a denial of service vulnerability in Apache CXF caused by unclosed CachedOutputStream instances that can fill up the file system. This post covers technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2025-23184 Overview

A denial of service vulnerability exists in Apache CXF, a popular open-source services framework for building and developing services using frontend programming APIs. The vulnerability stems from improper resource management in the CachedOutputStream class, where instances may not be properly closed in certain edge cases. When these streams are backed by temporary files, this can lead to file system exhaustion, effectively causing a denial of service condition on both servers and clients utilizing the affected framework.

Critical Impact

Attackers can exploit this vulnerability to exhaust file system resources on systems running vulnerable versions of Apache CXF, leading to service disruption and potential system instability affecting both server and client applications.

Affected Products

  • Apache CXF versions before 3.5.10
  • Apache CXF versions before 3.6.5
  • Apache CXF versions before 4.0.6

Discovery Timeline

  • 2025-01-21 - CVE-2025-23184 published to NVD
  • 2025-12-15 - Last updated in NVD database

Technical Details for CVE-2025-23184

Vulnerability Analysis

This vulnerability is classified as CWE-400 (Uncontrolled Resource Consumption), a category of security weaknesses where an application fails to properly limit the allocation of resources. In Apache CXF, the CachedOutputStream class is designed to buffer output data, optionally spilling to temporary files when the data exceeds a certain threshold. The vulnerability manifests when these cached output streams are not properly closed during specific edge case scenarios.

When the framework processes requests or responses, it may create CachedOutputStream instances to handle large payloads. Under normal operation, these streams should be closed and their associated temporary files deleted. However, in certain edge cases—potentially related to exception handling paths, connection interruptions, or specific data processing conditions—the cleanup routines fail to execute, leaving temporary files on disk.

Root Cause

The root cause lies in improper resource lifecycle management within the CachedOutputStream implementation. The class fails to guarantee cleanup of temporary files in all execution paths, particularly in edge cases where exceptions occur or processing is interrupted before the normal cleanup routines can execute. This represents a classic resource leak pattern where resources acquired during operation are not reliably released.

The issue affects both client and server components of Apache CXF, as both utilize the CachedOutputStream class for handling message bodies that exceed memory thresholds. Without proper finally blocks or try-with-resources patterns ensuring cleanup, temporary files accumulate over time.

Attack Vector

This vulnerability is exploitable over the network without requiring authentication or user interaction. An attacker can exploit this vulnerability by sending specially crafted requests to a vulnerable Apache CXF service that trigger the edge case conditions where CachedOutputStream instances are not properly closed.

The attack scenario involves repeatedly sending requests that cause the framework to create temporary files that are never cleaned up. Over time, this leads to:

  1. Disk space exhaustion on the target system
  2. Potential inode exhaustion on file systems with limited inodes
  3. Service degradation as disk I/O becomes constrained
  4. Complete service unavailability when the file system becomes full

The exploitation does not require complex attack techniques—an attacker simply needs to identify request patterns that trigger the vulnerable code paths and automate the sending of such requests. Since the vulnerability affects both servers and clients, a malicious server could also exploit vulnerable CXF clients by sending responses that trigger the same file accumulation behavior.

Detection Methods for CVE-2025-23184

Indicators of Compromise

  • Unusual accumulation of temporary files in the system's temporary directory (typically /tmp on Linux or %TEMP% on Windows)
  • Temporary files with patterns consistent with Apache CXF output caching (often prefixed with cxf or related identifiers)
  • Gradual decrease in available disk space without corresponding application data growth
  • File system warnings or errors related to disk space or inode exhaustion

Detection Strategies

  • Monitor disk space utilization on systems running Apache CXF applications with alerting thresholds
  • Implement file count monitoring for temporary directories to detect abnormal file accumulation
  • Review Apache CXF application logs for stream-related warnings or exceptions
  • Use application performance monitoring (APM) tools to track resource usage patterns in CXF services

Monitoring Recommendations

  • Configure disk space alerts at 80% and 90% utilization thresholds for early warning
  • Implement automated cleanup scripts for orphaned temporary files older than expected processing times
  • Monitor the count and age of temporary files created by CXF applications
  • Enable verbose logging during investigation to identify the specific edge cases triggering the leak

How to Mitigate CVE-2025-23184

Immediate Actions Required

  • Upgrade Apache CXF to version 3.5.10, 3.6.5, or 4.0.6 or later depending on your current major version branch
  • Review and increase available disk space on affected systems as a temporary measure
  • Implement monitoring for temporary file accumulation to detect active exploitation attempts
  • Configure automated cleanup of temporary files as an interim mitigation

Patch Information

Apache has released patched versions that address the improper resource handling in CachedOutputStream. Organizations should upgrade to the following versions based on their current deployment:

  • For 3.5.x branch: Upgrade to version 3.5.10 or later
  • For 3.6.x branch: Upgrade to version 3.6.5 or later
  • For 4.0.x branch: Upgrade to version 4.0.6 or later

Additional technical details are available through the Apache Mailing List Thread and the OpenWall OSS-Security Post. Organizations using NetApp products should also review the NetApp Security Advisory.

Workarounds

  • Implement a scheduled task to clean up orphaned temporary files from the CXF temporary directory
  • Increase the memory threshold for CachedOutputStream to reduce the likelihood of temporary file creation (at the cost of increased memory usage)
  • Configure separate temporary directories for CXF with appropriate disk quotas to contain the impact
  • Implement rate limiting on incoming requests to reduce the potential speed of file system exhaustion
bash
# Example: Temporary file cleanup cron job (Linux)
# Clean CXF temporary files older than 1 hour
0 * * * * find /tmp -name 'cxf*' -type f -mmin +60 -delete 2>/dev/null

# Monitor temporary file count
*/5 * * * * echo "$(date): $(find /tmp -name 'cxf*' -type f | wc -l) CXF temp files" >> /var/log/cxf-temp-monitor.log

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechApache Cxf

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.68%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-400

  • NVD-CWE-noinfo
  • Technical References
  • Apache Mailing List Thread

  • OpenWall OSS-Security Post

  • NetApp Security Advisory

  • Vicarius Detection Blog for CVE

  • Vicarius Mitigation Blog for CVE
  • Related CVEs
  • CVE-2025-48795: Apache CXF Denial of Service Vulnerability

  • CVE-2024-32007: Apache CXF JOSE DOS Vulnerability

  • CVE-2021-30468: Apache CXF DOS Vulnerability

  • CVE-2025-48913: Apache CXF JMS RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English