Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 19 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Remote Code Execution via Expression Language Injection in Glassfish XML Gadget Handler | |
| First Time appeared |
Eclipse
Eclipse glassfish |
|
| Vendors & Products |
Eclipse
Eclipse glassfish |
Tue, 19 May 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 19 May 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A critical Remote Code Execution (RCE) vulnerability was identified in the server-side template rendering mechanism used by the Glassfish gadget handler. The application processes .xml files and evaluates user-supplied values within a context where Expression Language (EL) “expressions” are processed without proper sanitization or escaping. By injecting expressions such as #{7*7}, the server returns 49, confirming server-side EL evaluation. This issue allows a remote attacker to fully compromise the underlying host, enabling capabilities as reading/modifying data, executing arbitrary commands, persistence, and lateral movement. | |
| Weaknesses | CWE-917 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: eclipse
Published:
Updated: 2026-05-19T14:40:24.843Z
Reserved: 2026-02-16T14:14:23.896Z
Link: CVE-2026-2587
Updated: 2026-05-19T14:40:21.559Z
Status : Received
Published: 2026-05-19T15:16:28.577
Modified: 2026-05-19T15:16:28.577
Link: CVE-2026-2587
No data.
OpenCVE Enrichment
Updated: 2026-05-19T15:30:08Z