Hi,
Re (3) no, this isn't possible. Our builds do load external libraries.
Which means that (2) also isn't possible.
Re (4), what I could do is to set the tika2 build job on our ci back up
so you'd get a snapshot build. However this would use the latest
versions of the external libraries, and thus you would have to use the
complete server jar. And this isn't something "official".
The better solution would be to update to 3.* instead of spending work
time on such weird workarounds. The risk of supply chain attacks
(indirectly mentioned in (1)) is the same when we run our builds on our
ci because we still use the external libraries and these could be "evil"
without us noticing. Although I haven't heard of attacks on java / maven
(mostly on js and python, and the xz attack), the risk will grow in the
future due to people like us getting too old / ill / senile / dead. So
consider running your server in a controlled environment so that an
"evil" PDF (with an "evil" XFA in it) won't be able to do anything.
https://tika.apache.org/security-model.html
Tilman
Am 13.10.2025 um 06:33 schrieb Saravanan Balakrishnan:
Hi Tika Team,
I am looking for feasible solution for your problem as we are trying
to compile branch_2x which has the fix for CVE-2025-54988 PDF XXE,
1. We have few restrictions on compiling in our build room, we easy
way to compile only the affected class files in that branch to get
the fix into our build.
2. Is there are way to compile only affected folders alone and use
the class files in the 2.9.4 jar file, which is released. All we
need is to get that fix into 2.9.4 without full compilation.
3. When we compile tika-server-standard does it download dependent
jar/class files while compiling as our build system doesn't have
external access to download dependent files if any. If you could
provide some light on this to compile very minimal without
downloading jars/classes.
4. Is it possible to compile from your end and share it us, I mean
branch_2x which creates 2.9.5.
Our customers are very keen to get this fixed ASAP. Kindly provide
best possible solution to get the vulnerability fix for 2.x release.
We appreciate your valuable time and response.
Regards,
Saravanan B