CVE-2025-46295
Published: 16 December 2025
Description
Apache Commons Text versions prior to 1.10.0 included interpolation features that could be abused when applications passed untrusted input into the text-substitution API. Because some interpolators could trigger actions like executing commands or accessing external resources, an attacker could potentially…
more
achieve remote code execution. This vulnerability has been fully addressed in FileMaker Server 22.0.4.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2025-46295 by requiring timely patching of vulnerable Apache Commons Text versions prior to 1.10.0 or upgrading FileMaker Server to 22.0.4.
Prevents exploitation by validating and sanitizing untrusted input passed to the text-substitution API, blocking malicious interpolators that enable RCE.
Prohibits use of unsupported or vulnerable system components like Apache Commons Text prior to 1.10.0, eliminating the vulnerable library from deployments.
Security SummaryAI
CVE-2025-46295 affects Apache Commons Text versions prior to 1.10.0, where interpolation features in the text-substitution API can be abused by passing untrusted input. These interpolators enable actions such as executing commands or accessing external resources, potentially leading to remote code execution (classified under CWE-94). The vulnerability has been fully addressed in FileMaker Server 22.0.4, indicating that FileMaker Server deployments relying on vulnerable versions of the Apache Commons Text library are impacted.
A remote, unauthenticated attacker with network access can exploit this vulnerability with low complexity and no user interaction required, as reflected in its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By crafting malicious input for the text-substitution API, the attacker can trigger interpolators to execute arbitrary commands or access external resources on the target system, achieving full remote code execution.
The Claris support advisory at https://support.claris.com/s/answerview?anum=000049059&language=en_US confirms that the issue is fully resolved in FileMaker Server 22.0.4, recommending affected users upgrade to this version for mitigation.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables exploitation of public-facing application (FileMaker Server) via remote unauthenticated access (T1190) and abuse of text interpolation/template substitution features for RCE (T1221).