Apache James prior to version 3.7.5 and 3.8.0 exposes a JMX endpoint on localhost subject to pre-authentication deserialisation of untrusted data.
Given a deserialisation gadjet, this could be leveraged as part of an exploit chain that could result in privilege escalation.
Note that by default JMX endpoint is only bound locally.
We recommend users to:
 - Upgrade to a non-vulnerable Apache James version
 - Run Apache James isolated from other processes (docker - dedicated virtual machine)
 - If possible turn off JMX
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 05 May 2025 21:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Apache Apache james | |
| CPEs | cpe:2.3:a:apache:james:3.7.5:*:*:*:*:*:*:* cpe:2.3:a:apache:james:3.8.0:*:*:*:*:*:*:* | |
| Vendors & Products | Apache Apache james | 
Thu, 22 Aug 2024 22:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: apache
Published: 2024-02-27T09:09:31.579Z
Updated: 2024-08-22T20:42:38.254Z
Reserved: 2023-12-20T16:14:49.938Z
Link: CVE-2023-51518
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-02T22:32:10.273Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-02-27T09:15:36.983
Modified: 2025-05-05T21:01:52.963
Link: CVE-2023-51518
 Redhat
                        Redhat
                    No data.