Skip to content

au.com.dius.pact.provider:junit5 4.6.18 has dependency on vulnerable Apache Tika version #1885

@DanCorderIPV

Description

@DanCorderIPV

Apache Tika versions >= 1.13, < 3.2.2 contain a PDF processing vulnerability. I guess it's unlikely that this functionality is used by the pact framework, but it makes security scanners very upset, and the actual fix is in tika-core.

CVE-2025-66516
CVE-2025-54988

Would it be possible to switch to v3.2.2 or higher of Tika?

Worth noting that we have tried forcing the existing pact framework to use v3.2.3 and it results in some pact request bodies being incorrectly Base64 encoded, so it probably isn't a completely trivial update.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions