{"id":"CVE-2020-10718","details":"A flaw was found in Wildfly before wildfly-embedded-13.0.0.Final, where the embedded managed process API has an exposed setting of the Thread Context Classloader (TCCL). This setting is exposed as a public method, which can bypass the security manager. The highest threat from this vulnerability is to confidentiality.","aliases":["BIT-wildfly-2020-10718"],"modified":"2026-02-18T00:22:12.669508Z","published":"2020-09-16T19:15:13.210Z","references":[{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1828476"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1828476"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wildfly/wildfly","events":[{"introduced":"0"},{"fixed":"8116c89f7cb4e200e9db45a247e8a8aff7f6177a"}]}],"versions":["10.0.0.Alpha1","10.0.0.Alpha2","10.0.0.Alpha3","10.0.0.Alpha4","10.0.0.Alpha5","10.0.0.Alpha6","10.0.0.Beta1","10.0.0.Beta2","10.0.0.CR1","10.0.0.CR2","10.0.0.CR3","10.0.0.CR4","10.0.0.CR5","10.0.0.Final","11.0.0.Alpha1","11.0.0.Beta1","11.0.0.CR1","11.0.0.Final","12.0.0.Beta1","12.0.0.CR1","12.0.0.Final","13.0.0.Beta1","7.0.0.Alpha1","7.0.0.Alpha1-final","7.0.0.Beta1-prerelease","7.0.0.Beta2","7.0.0.Beta2-prerelease","7.0.0.Beta3","7.0.0.CR1","7.0.0.Final","7.0.0.Final-prerelease","7.0.0.Final-prerelease2","7.0.0.Final-prerelease3","7.1.0.Alpha1","7.1.0.Beta1","7.1.0.CR1","7.1.0.Final","7.1.0.Final-prerelease","7.1.0.Final-prerelease2","7.1.1.Final","7.1.2-prerelease","7.1.2.Final","7.2.0.Final","7.2.0.Final-prerelease1","8.0.0.Alpha1","8.0.0.Alpha2","8.0.0.Alpha3","8.0.0.Alpha4","8.0.0.Beta1","8.0.0.CR1","8.0.0.Final","8.1.0.CR1","8.1.0.CR2","9.0.0.Beta1","9.0.0.Beta2","9.0.0.CR1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-10718.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}