Critical Vulnerability Alert: json-schema-validator-2.2.14.jar Exposes Workflow Bot to Medium-Severity Flaw
A widely used Java JSON Schema validator library contains a reachable, medium-severity vulnerability, exposing dependent applications to potential exploitation. The flaw, tracked as CVE-2023-2976 with a CVSS score of 5.5, resides within the `json-schema-validator-2.2.14.jar` file. This library is a direct dependency of a workflow bot application, as identified in its `/workflow-bot-app/build.gradle` file, making the vulnerability directly accessible and exploitable within the application's runtime environment.
The vulnerability originates from a transitive dependency, `guava-31.1-jre.jar`. While the exploit maturity is currently 'Not Defined' and the EPSS score is below 1%, the 'reachable' status signifies the vulnerable code path is active and can be triggered by an attacker. This creates a tangible security gap in systems relying on this specific version of the validator for processing JSON data. A fixed version is available for the underlying Guava library (`com.google.guava:guava:32.0.1-jre`), but the primary `json-schema-validator` artifact itself remains at the vulnerable 2.2.14 release in this instance.
This finding highlights a critical software supply chain risk for Java-based applications, particularly automation and integration tools like workflow bots. Organizations using this library must prioritize remediation to prevent potential data manipulation or denial-of-service attacks stemming from the Guava flaw. The presence of a reachable path elevates this from a theoretical concern to an immediate operational security issue requiring patch deployment or dependency version upgrades.