Skip to content
  • Categories
  • Recent
  • Popular
Collapse
Brand Logo
  1. Home
  2. Categories
  3. GoFAST (EN)
  4. Apache Tika Security Flaw (CVE-2025-66516)

Apache Tika Security Flaw (CVE-2025-66516)

Scheduled Pinned Locked Moved GoFAST (EN)
1 Posts 1 Posters 13 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • jlemangarinJ Offline
    jlemangarinJ Offline
    jlemangarin
    ADMIN SUPPORT-PROD DEV
    wrote last edited by
    #1

    Dear community,

    The CVE-2025-66516 describes an XXE (XML External Entity injection) vulnerability in Apache Tika. It can be exploited when Tika processes PDFs containing specially crafted XFA (XML Forms Architecture) content.

    Following the CVE publication and analysis, we performed a full identification of all Tika dependencies within the GoFAST ecosystem:

    • CEO-Vision executable (embedded binary)
    • Alfresco (transformation component)
    • Solr (extraction module "SolrCell")

    This post provides a retrospective of the analyses performed and the actions taken by our security committee to address this vulnerability.

    References:

    • NVD record
    • RedHat record
    • Apache Solr advisory
    • Alfresco advisory

    ➡️ Embedded CEO-Vision Tika executable

    Even though the embedded executable is not directly exposed and is only used after multiple control layers (application stack, security filtering, antivirus scans, etc.), it was immediately handled within our security pipeline.

    As a result:

    • The embedded Tika component was immediately updated through a dedicated security patch, progressively deployed to all supported GoFAST Enterprise production environments without requiring any service interruption.
    • The fix has been integrated into the current GoFAST security release 4.4.1 and will also be included in upcoming versions.

    ➡️ Tika dependencies in Alfresco

    The Alfresco Content Services Community Distribution may embed Tika dependencies that require updates in certain setups.

    However, the GoFAST core component Alfresco Repository is not impacted, as it has no longer performed content extraction internally since version 7.0.

    The impacted Alfresco component is Alfresco Transform Core, used via T-Engine, which has not been installed or used in GoFAST since v4.

    Document transformations are now handled directly by our embedded applications, mainly for performance reasons (OnlyOffice, LibreOffice, embedded Tika executable, etc.).

    Attempting to activate the Alfresco transformer confirmed that the component is not loaded, as it is not present in our deployments:

    f03d6ceb-a5e4-4ca0-811a-0aea0ea25fd4-image.png

    It has therefore been confirmed that the Alfresco CE integration in GoFAST is not vulnerable to CVE-2025-66516.

    ➡️ Tika dependencies in Apache Solr

    Apache Solr may also embed Tika dependencies that require updates in some configurations.

    The vulnerability affects the extraction module (SolrCell), which is not used in our GoFAST integration of Apache Solr.

    In GoFAST, content and metadata extraction has always been fully managed by our application stack (Alfresco, embedded Tika executable, etc.).

    As a preventive measure, we still attempted to deploy the vendor-recommended mitigation for impacted environments, and confirmed that the extraction libraries are not even loaded in our case:

    f317a989-a56f-4237-a559-c768d4179924-image.png

    It has therefore been confirmed that the Apache Solr integration in GoFAST is not vulnerable to CVE-2025-66516.

    ➡️ Roadmap, Monitoring & Security Watch

    The following roadmap has been defined for the two components that contain Tika dependencies but do not load them in our deployments:

    • Alfresco Content Services Community components are scheduled for a major update in the next intermediate GoFAST release.
    • Apache Solr is also scheduled for a major update in the next intermediate GoFAST release.

    The CEO-Vision security committee continues to actively monitor:

    • Vendor announcements (Apache, Hyland, RedHat, etc.)
    • Hardening and mitigation recommendations
    • Field feedback (CNA/NVD updates, OS security bulletins, etc.)

    For GoFAST Enterprise administrators: if you are currently running an unsupported GoFAST version, we strongly encourage you to contact your Enterprise Support via the update ticket that was opened for you, in order to plan your upgrade as soon as possible.

    Have a great day!

    LEMAN-GARIN Jérôme - CEO-Vision IT
    jerome.leman@ceo-vision.com
    Alliance - Porte A, 178 rue des Frères Lumière 74160 Archamps Technopole, FRANCE
    +33 (0) 811 693 111 et depuis l'étranger +33 (0) 972 236 057
    https://www.ceo-vision.com

    1 Reply Last reply
    1
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Don't have an account? Register

    • Search
    • First post
      Last post
    0
    • Categories
    • Recent
    • Popular
    • Search