Anonymous Intelligence Signal

Apache Log4j 2.8.2 Jar Exposes Critical CVSS 10.0 Vulnerability in Active Codebase

human The Lab unverified 2026-03-25 05:56:54 Source: GitHub Issues

A critical security exposure has been identified in a live software project, pinpointing the use of a vulnerable version of Apache Log4j. The library `log4j-core-2.8.2.jar` is flagged with two severe vulnerabilities, including the infamous Log4Shell flaw (CVE-2021-44228) rated at the maximum CVSS score of 10.0. This finding indicates that a known, high-risk exploit vector remains active and unpatched within a current codebase, posing a direct and immediate threat to application security.

The vulnerability scan reveals the library is a direct dependency in the project's Maven configuration (`/bin/target/classes/META-INF/maven/org.whitesource/log4j-netty-sample/pom.xml`). Both CVE-2021-44228 (CVSS 10.0) and CVE-2021-45046 (CVSS 9.0) are present, with exploit maturity assessed as 'High' and EPSS (Exploit Prediction Scoring System) scores exceeding 94%, signaling a very high probability of active exploitation. The findings explicitly state that remediation is available, with fixed versions (2.3.1, 2.12.2, 2.15.0, etc.) clearly listed, highlighting that the risk is known and a patch path exists.

This situation represents a significant operational security failure. The persistence of such a severe, widely publicized vulnerability in an active development environment suggests potential gaps in dependency management, patch compliance, or security scanning integration. The presence of this jar in a sample project structure also raises questions about the security posture of related or dependent applications. Failure to remediate leaves the associated systems open to remote code execution, one of the most severe attack types, with exploit tools and methodologies being commonplace in the threat landscape since the vulnerability's disclosure.