A critical vulnerability has been fixed in Apache Commons Text, a ubiquitous Java library used for text manipulation, preventing what could have been a widespread remote code execution (RCE) crisis. Tracked as CVE-2025-46295, the flaw carries a near-maximum CVSS score of 9.8, marking it as an urgent threat to unpatched systems.
The vulnerability stems from the library’s string interpolation features—tools designed to dynamically substitute text. However, versions prior to 1.10.0 contained a fatal oversight: they allowed applications to pass untrusted input directly into the text-substitution API.
“Because some interpolators could trigger actions like executing commands or accessing external resources, an attacker could potentially achieve remote code execution,” the security advisory warns. This mechanism is perilously similar to the “Log4Shell” vulnerability that shook the internet, turning a standard data processing function into a gateway for server takeover.
The ripples of this discovery reached FileMaker Server, which relies on the library for its operations. In a rapid response, the development team has confirmed that the issue is “fully addressed in FileMaker Server 22.0.4”.
The update hardens the platform by upgrading the underlying Apache Commons Text component to version 1.14.0, effectively closing the door on the exploit.
Administrators are strongly advised to patch their systems immediately. “We strongly recommend updating to ensure the security of your FileMaker Server deployments,” the advisory states.