Table of Contents
For reporting security issues, see SECURITY.md.
Security Vulnerabilities
CVE-2026 TBD
Published: 2026-02-27
Severity: Medium
Summary: Stored XSS in HTML renderers via unescaped violation messages
Versions Affected:
- net.sourceforge.pmd:pmd-core 7.21.0 and earlier
Description:
PMDβs vbhtml and yahtml report formats insert rule violation messages into HTML output without escaping.
When PMD analyzes untrusted source code containing crafted string literals, the generated HTML report contains
executable JavaScript that runs when opened in a browser.
While the default html format is not affected via rule violation messages (it correctly uses
StringEscapeUtils.escapeHtml4()), it has a similar problem when rendering suppressed violations.
The user supplied message (the reason for the suppression) was not escaped.
Details:
VBHTMLRenderer.java line 71 appends rv.getDescription() directly into HTML:
sb.append("<td><font class=body>").append(rv.getDescription()).append("</font></td>");
YAHTMLRenderer.java lines 196β203 does the same via renderViolationRow():
private String renderViolationRow(String name, String value) {
return "<tr><td><b>" + name + "</b></td>" + "<td>" + value + "</td></tr>";
}
Called at line 172:
out.print(renderViolationRow("Description:", violation.getDescription()));
The violation message originates from AvoidDuplicateLiteralsRule.java line 91, which embeds raw string literal
values via first.toPrintableString(). This calls StringUtil.escapeJava() (line 476β480), which is a Java source
escaper β it passes <, >, and & through unchanged because they are printable ASCII (0x20β0x7e).
By contrast, HTMLRenderer.java line 143 properly escapes:
String d = StringEscapeUtils.escapeHtml4(rv.getDescription());
PoC:
- Create a Java file with 4+ duplicate string literals containing an HTML payload:
public class Exploit {
String a = "<img src=x onerror=alert(document.domain)>";
String b = "<img src=x onerror=alert(document.domain)>";
String c = "<img src=x onerror=alert(document.domain)>";
String d = "<img src=x onerror=alert(document.domain)>";
}
- Run PMD with the
vbhtmlformat:
pmd check -R category/java/errorprone.xml -f vbhtml -d Exploit.java -r report.html
- Open
report.htmlin a browser. A JavaScript alert executes showingdocument.domain.
The generated HTML contains the unescaped tag:
<td><font class=body>The String literal "<img src=x onerror=alert(document.domain)>" appears 4 times in this file</font></td>
Tested and confirmed on PMD 7.22.0-SNAPSHOT (commit bcc646c53d).
Impact:
Stored cross-site scripting (XSS). Affects CI/CD pipelines that run PMD with --format vbhtml or --format yahtml
on untrusted source code (e.g., pull requests from external contributors) and expose the HTML report as a build
artifact. JavaScript executes in the browser context of anyone who opens the report.
Practical impact is limited because vbhtml and yahtml are legacy formats rarely used in practice.
The default html format has a similar issue with user messages from suppressed violations.
Fixes
- See #6475: [core] Fix stored XSS in VBHTMLRenderer and YAHTMLRenderer
References:
CVE-2025-23215
Published: 2025-01-31
Severity: Low
Summary: Release key passphrase (GPG) available on Maven Central in cleartext
Versions Affected:
- net.sourceforge.pmd:pmd-core 7.9.0 and earlier
- net.sourceforge.pmd:pmd-designer 7.9.0 and earlier
- net.sourceforge.pmd:pmd-ui 7.0.0-rc4 and earlier
- net.sourceforge.pmd.eclipse.plugin 7.9.0.v20241227-1626-r
Description:
While rebuilding PMD Designer for Reproducible Builds and digging into issues,
I found out that passphrase for gpg.keyname=0xD0BF1D737C9A1C22 is included in jar published to Maven Central.
Details See https://github.com/jvm-repo-rebuild/reproducible-central/blob/master/content/net/sourceforge/pmd/pmd-designer/README.md
I removed 2 lines from https://github.com/jvm-repo-rebuild/reproducible-central/blob/master/content/net/sourceforge/pmd/pmd-designer/pmd-designer-7.0.0.diffoscope but real content is:
βββ net/sourceforge/pmd/util/fxdesigner/designer.properties
β @@ -1,14 +1,12 @@
β #Properties
β checkstyle.plugin.version=3.3.1
β checkstyle.version=10.14.0
β -gpg.keyname=0xD0BF1D737C9A1C22
β -gpg.passphrase=evicx0nuPfvSVhVyeXpw
β jar.plugin.version=3.3.0
β -java.version=11.0.22
β +java.version=11.0.25
β javadoc.plugin.version=3.6.3
β jflex-output=/home/runner/work/pmd-designer/pmd-designer/target/generated-sources/jflex
β junit5.version=5.8.2
β kotest.version=5.5.5
β kotlin.version=1.7.20
β local.lib.repo=/home/runner/work/pmd-designer/pmd-designer/lib/mvn-repo
β openjfx.scope=provided
PoC
./rebuild.sh content/net/sourceforge/pmd/pmd-designer/pmd-designer-7.0.0.buildspec
Impact After further analysis, the passphrase of the following two keys have been compromised:
94A5 2756 9CAF 7A47 AFCA BDE4 86D3 7ECA 8C2E 4C5B: PMD Designer (Release Signing Key) releases@pmd-code.org This key has been used since 2019 with the release of net.sourceforge.pmd:pmd-ui:6.14.0. The following versions are signed with the same key: 6.16.0, 6.17.0, 6.19.0.EBB2 41A5 45CB 17C8 7FAC B2EB D0BF 1D73 7C9A 1C22: PMD Release Signing Key releases@pmd-code.org This key has been used since 2020 with the release of net.sourceforge.pmd:pmd-ui:6.21.0 and all the other modules of PMD such as net.sourceforge.pmd:pmd-core:6.21.0.
This key has also been used for PMD 7, for the designer, e.g. net.sourceforge.pmd:pmd-designer:7.0.0 and net.sourceforge.pmd:pmd-core:7.0.0. The versions between 6.21.0 and 7.9.0 are signed with this key.
Additionally the key has been used to sign the last release of PMD Eclipse Plugin 7.9.0.v20241227-1626-r.
The keys have been used exclusively for signing artifacts that we published to Maven Central under group
id net.sourceforge.pmd and once for our pmd-eclipse-plugin. The private key itself is not known to have
been compromised itself, but given its passphrase is, it must also be considered potentially compromised.
As a mitigation, both compromised keys have been revoked so that no future use of the keys are possible.
For future releases of PMD, PMD Designer and PMD Eclipse Plugin we use a new release signing key:
2EFA 55D0 785C 31F9 56F2 F87E A0B5 CA1A 4E08 6838 (PMD Release Signing Key releases@pmd-code.org).
Note, that the published artifacts in Maven Central under the group id net.sourceforge.pmd are not
compromised and the signatures are valid. No other past usages of the private key is known to the project
and no future use is possible due to the revocation. If anybody finds a past abuse of the private key,
please share with us.
Note, the module net.sourceforge.pmd:pmd-ui has been renamed to net.sourceforge.pmd:pmd-designer since PMD 7,
so there wonβt be a fixed version for pmd-ui.
Fixes
- Reworked build script in PMD Designer to not include all system properties
- https://github.com/pmd/pmd-designer/commit/1548f5f27ba2981b890827fecbd0612fa70a0362
- https://github.com/pmd/pmd-designer/commit/e87a45312753ec46b3e5576c6f6ac1f7de2f5891
References:
CVE-2019-7722
Published: 2019-02-11
Description:
PMD 5.8.1 and earlier processes XML external entities in ruleset files it parses as part of the analysis process, allowing attackers tampering it (either by direct modification or MITM attacks when using remote rulesets) to perform information disclosure, denial of service, or request forgery attacks. (PMD 6.x is unaffected because of a 2017-09-15 change.)
References: