{"api_version":"1","generated_at":"2026-05-15T00:39:12+00:00","cve":"CVE-2026-42555","urls":{"html":"https://cve.report/CVE-2026-42555","api":"https://cve.report/api/cve/CVE-2026-42555.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-42555","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-42555"},"summary":{"title":"Valtimo: SpEL injection via StandardEvaluationContext allows Remote Code Execution by admin users","description":"Valtimo is an open-source business process automation platform. com.ritense.valtimo:document from 12.0.0 to before 12.32.0, com.ritense.valtimo:case from 13.0.0 to before 13.23.0, and com.ritense.valtimo:contract from 13.4.0 to before 13.23.0 evaluate Spring Expression Language (SpEL) expressions from user-supplied input using StandardEvaluationContext, which provides unrestricted access to Java types and methods. An authenticated user with the ADMIN role can achieve Remote Code Execution and credential exfiltration. This vulnerability is fixed in com.ritense.valtimo:document 2.32.0, com.ritense.valtimo:case 13.23.0, and com.ritense.valtimo:contract 13.23.0.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-05-14 17:16:21","updated_at":"2026-05-14 18:13:33"},"problem_types":["CWE-94","CWE-94 CWE-94: Improper Control of Generation of Code ('Code Injection')"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"9.1","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"9.1","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-j7j9-5253-f7vh","name":"https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-j7j9-5253-f7vh","refsource":"security-advisories@github.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-42555","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-42555","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"valtimo-platform","product":"valtimo","version":"affected < 13.23.0","platforms":[]},{"source":"CNA","vendor":"com.ritense.valtimo","product":"case","version":"affected >= 13.0.0, < 13.23.0","platforms":[]},{"source":"CNA","vendor":"com.ritense.valtimo","product":"contract","version":"affected >= 13.4.0, < 13.23.0","platforms":[]},{"source":"CNA","vendor":"com.ritense.valtimo","product":"document","version":"affected >= 12.0.0, < 12.32.0","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"valtimo","vendor":"valtimo-platform","versions":[{"status":"affected","version":"< 13.23.0"}]},{"product":"case","vendor":"com.ritense.valtimo","versions":[{"status":"affected","version":">= 13.0.0, < 13.23.0"}]},{"product":"contract","vendor":"com.ritense.valtimo","versions":[{"status":"affected","version":">= 13.4.0, < 13.23.0"}]},{"product":"document","vendor":"com.ritense.valtimo","versions":[{"status":"affected","version":">= 12.0.0, < 12.32.0"}]}],"descriptions":[{"lang":"en","value":"Valtimo is an open-source business process automation platform. com.ritense.valtimo:document from 12.0.0 to before 12.32.0, com.ritense.valtimo:case from 13.0.0 to before 13.23.0, and com.ritense.valtimo:contract from 13.4.0 to before 13.23.0 evaluate Spring Expression Language (SpEL) expressions from user-supplied input using StandardEvaluationContext, which provides unrestricted access to Java types and methods. An authenticated user with the ADMIN role can achieve Remote Code Execution and credential exfiltration. This vulnerability is fixed in com.ritense.valtimo:document 2.32.0, com.ritense.valtimo:case 13.23.0, and com.ritense.valtimo:contract 13.23.0."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":"CWE-94: Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-14T16:45:48.718Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-j7j9-5253-f7vh","tags":["x_refsource_CONFIRM"],"url":"https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-j7j9-5253-f7vh"}],"source":{"advisory":"GHSA-j7j9-5253-f7vh","discovery":"UNKNOWN"},"title":"Valtimo: SpEL injection via StandardEvaluationContext allows Remote Code Execution by admin users"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-42555","datePublished":"2026-05-14T16:45:48.718Z","dateReserved":"2026-04-28T16:56:50.191Z","dateUpdated":"2026-05-14T16:45:48.718Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-14 17:16:21","lastModifiedDate":"2026-05-14 18:13:33","problem_types":["CWE-94","CWE-94 CWE-94: Improper Control of Generation of Code ('Code Injection')"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"42555","Ordinal":"1","Title":"Valtimo: SpEL injection via StandardEvaluationContext allows Rem","CVE":"CVE-2026-42555","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"42555","Ordinal":"1","NoteData":"Valtimo is an open-source business process automation platform. com.ritense.valtimo:document from 12.0.0 to before 12.32.0, com.ritense.valtimo:case from 13.0.0 to before 13.23.0, and com.ritense.valtimo:contract from 13.4.0 to before 13.23.0 evaluate Spring Expression Language (SpEL) expressions from user-supplied input using StandardEvaluationContext, which provides unrestricted access to Java types and methods. An authenticated user with the ADMIN role can achieve Remote Code Execution and credential exfiltration. This vulnerability is fixed in com.ritense.valtimo:document 2.32.0, com.ritense.valtimo:case 13.23.0, and com.ritense.valtimo:contract 13.23.0.","Type":"Description","Title":"Valtimo: SpEL injection via StandardEvaluationContext allows Rem"}]}}}