CVE-2025-53192

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/08/2025
Last modified:
04/11/2025

Description

** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Expression/Command Delimiters vulnerability in Apache Commons OGNL.<br /> <br /> This issue affects Apache Commons OGNL: all versions.<br /> <br /> <br /> <br /> When using the API Ognl.getValue​, the OGNL engine parses and evaluates the provided expression with powerful capabilities, including accessing and invoking related methods,<br /> etc. Although OgnlRuntime attempts to restrict certain dangerous classes and methods (such as java.lang.Runtime) through a blocklist, these restrictions are not comprehensive. <br /> Attackers may be able to bypass the restrictions by leveraging class objects that are not covered by the blocklist and potentially achieve arbitrary code execution.<br /> <br /> As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.<br /> <br /> <br /> NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:apache:commons_ognl:*:*:*:*:*:*:*:*