{"api_version":"1","generated_at":"2026-04-21T10:52:34+00:00","cve":"CVE-2026-6264","urls":{"html":"https://cve.report/CVE-2026-6264","api":"https://cve.report/api/cve/CVE-2026-6264.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-6264","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-6264"},"summary":{"title":"Critical Security fix for the Talend JobServer and Talend Runtime","description":"A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Talend ESB Runtime, the vulnerability can be mitigated by disabling the JobServer JMX monitoring port, which is disabled by default from the R2024-07-RT patch.","state":"PUBLISHED","assigner":"Bugcrowd","published_at":"2026-04-14 03:16:09","updated_at":"2026-04-17 15:26:13"},"problem_types":["CWE-306 Missing Authentication for Critical Function"],"metrics":[{"version":"3.1","source":"4ac701fe-44e9-4bcd-9585-dd6449257611","type":"Secondary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fix-for-the-Qlik-Talend-JobServer-and-Talend/tac-p/2541974","name":"https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fix-for-the-Qlik-Talend-JobServer-and-Talend/tac-p/2541974","refsource":"4ac701fe-44e9-4bcd-9585-dd6449257611","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-6264","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-6264","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Talend","product":"Talend JobServer","version":"affected 8.0 TPS-6017 custom","platforms":[]},{"source":"CNA","vendor":"Talend","product":"Talend JobServer","version":"affected 7.3 TPS-6018 custom","platforms":[]},{"source":"CNA","vendor":"Talend","product":"Talend Runtime","version":"affected 8.0 8.0.1.R2026-01-RT custom","platforms":[]},{"source":"CNA","vendor":"Talend","product":"Talend Runtime","version":"affected 7.3 7.3.1-R2026-01 custom","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Harpreet Singh (@TheCyb3rAlpha), Profession: Security Researcher","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"6264","cve":"CVE-2026-6264","epss":"0.002820000","percentile":"0.516570000","score_date":"2026-04-20","updated_at":"2026-04-21 00:07:47"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-6264","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-04-14T13:07:04.623162Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-14T13:14:17.018Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Talend JobServer","vendor":"Talend","versions":[{"lessThan":"TPS-6017","status":"affected","version":"8.0","versionType":"custom"},{"lessThan":"TPS-6018","status":"affected","version":"7.3","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Talend Runtime","vendor":"Talend","versions":[{"lessThan":"8.0.1.R2026-01-RT","status":"affected","version":"8.0","versionType":"custom"},{"lessThan":"7.3.1-R2026-01","status":"affected","version":"7.3","versionType":"custom"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:talend:jobserver:*:*:*:*:*:*:*:*","versionEndExcluding":"TPS-6017","vulnerable":true},{"criteria":"cpe:2.3:a:talend:esb_runtime:*:*:*:*:*:*:*:*","versionEndExcluding":"8.0.1.R2026-01-RT","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"OR"}],"credits":[{"lang":"en","value":"Harpreet Singh (@TheCyb3rAlpha), Profession: Security Researcher"}],"descriptions":[{"lang":"en","value":"A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Talend ESB Runtime, the vulnerability can be mitigated by disabling the JobServer JMX monitoring port, which is disabled by default from the R2024-07-RT patch."}],"metrics":[{"cvssV3_1":{"baseScore":9.8,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"description":"CWE-306 Missing Authentication for Critical Function","lang":"en"}]}],"providerMetadata":{"dateUpdated":"2026-04-16T00:03:18.302Z","orgId":"4ac701fe-44e9-4bcd-9585-dd6449257611","shortName":"Bugcrowd"},"references":[{"url":"https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fix-for-the-Qlik-Talend-JobServer-and-Talend/tac-p/2541974"}],"title":"Critical Security fix for the Talend JobServer and Talend Runtime"}},"cveMetadata":{"assignerOrgId":"4ac701fe-44e9-4bcd-9585-dd6449257611","assignerShortName":"Bugcrowd","cveId":"CVE-2026-6264","datePublished":"2026-04-14T01:49:08.920Z","dateReserved":"2026-04-14T01:12:19.962Z","dateUpdated":"2026-04-16T00:03:18.302Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-14 03:16:09","lastModifiedDate":"2026-04-17 15:26:13","problem_types":["CWE-306 Missing Authentication for Critical Function"],"metrics":{"cvssMetricV31":[{"source":"4ac701fe-44e9-4bcd-9585-dd6449257611","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"6264","Ordinal":"1","Title":"Critical Security fix for the Talend JobServer and Talend Runtim","CVE":"CVE-2026-6264","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"6264","Ordinal":"1","NoteData":"A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Talend ESB Runtime, the vulnerability can be mitigated by disabling the JobServer JMX monitoring port, which is disabled by default from the R2024-07-RT patch.","Type":"Description","Title":"Critical Security fix for the Talend JobServer and Talend Runtim"}]}}}