Thank you very much, Marcin, for raising this issue.
It's true there is no errata for JBoss EAP for CVE-2022-34169. The problematic code in the xalan-j 2.7.1-jbossorg-5 jar that WildFly uses is not present in the 2.7.1.redhat-00013 release that EAP uses. That code comes into the artifact WildFly uses via the shading in of BCEL.jar in
https://github.com/jboss/xalan-j/tree/jboss_2_7_1/lib. The redhat-xxxx builds do not shade that jar in.
So, WildFly is vulnerable to this, in that we ship the problematic code. Normal use of WildFly does not require the problematic code, which mitigates the risk.
Best regards,
Brian Stansberry
Project Lead, WildFly