CVE-2025-53103

NameCVE-2025-53103
DescriptionJUnit is a testing framework for Java and the JVM. From version 5.12.0 to 5.13.1, JUnit's support for writing Open Test Reporting XML files can leak Git credentials. The impact depends on the level of the access token exposed through the OpenTestReportGeneratingListener. If these test reports are published or stored anywhere public, then there is the possibility that a rouge attacker can steal the token and perform elevated actions by impersonating the user or app. This issue as been patched in version 5.13.2.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
junit5 (PTS)bullseye5.3.2-4fixed
bookworm5.9.2-1fixed
trixie, sid5.10.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
junit5source(unstable)(not affected)

Notes

- junit5 <not-affected> (Vulnerable code not present, introduced in 5.12)
https://github.com/junit-team/junit-framework/security/advisories/GHSA-m43g-m425-p68x
Fixed by: https://github.com/junit-team/junit-framework/commit/d4fc834c8c1c0b3168cd030c13551d1d041f51bc (r5.13.2)

Search for package or bug name: Reporting problems