CVE-2025-53192
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/08/2025
Last modified:
04/11/2025
Description
** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Expression/Command Delimiters vulnerability in Apache Commons OGNL.<br />
<br />
This issue affects Apache Commons OGNL: all versions.<br />
<br />
<br />
<br />
When using the API Ognl.getValue, the OGNL engine parses and evaluates the provided expression with powerful capabilities, including accessing and invoking related methods,<br />
etc. Although OgnlRuntime attempts to restrict certain dangerous classes and methods (such as java.lang.Runtime) through a blocklist, these restrictions are not comprehensive. <br />
Attackers may be able to bypass the restrictions by leveraging class objects that are not covered by the blocklist and potentially achieve arbitrary code execution.<br />
<br />
As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.<br />
<br />
<br />
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:commons_ognl:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



