{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T20:14:18.363","vulnerabilities":[{"cve":{"id":"CVE-2025-53192","sourceIdentifier":"security@apache.org","published":"2025-08-18T20:15:29.630","lastModified":"2025-11-04T22:16:21.433","vulnStatus":"Modified","cveTags":[{"sourceIdentifier":"security@apache.org","tags":["unsupported-when-assigned"]}],"descriptions":[{"lang":"en","value":"** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Expression/Command Delimiters vulnerability in Apache Commons OGNL.\n\nThis issue affects Apache Commons OGNL: all versions.\n\n\n\nWhen using the API Ognl.getValue​, the OGNL engine parses and evaluates the provided expression with powerful capabilities, including accessing and invoking related methods,\n etc. Although OgnlRuntime attempts to restrict certain dangerous classes and methods (such as java.lang.Runtime) through a blocklist, these restrictions are not comprehensive. \nAttackers may be able to bypass the restrictions by leveraging class objects that are not covered by the blocklist and potentially achieve arbitrary code execution.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer."},{"lang":"es","value":"** NO SOPORTADO CUANDO SE ASIGNÓ ** Vulnerabilidad de neutralización incorrecta de delimitadores de expresiones/comandos en Apache Commons OGNL. Este problema afecta a Apache Commons OGNL: todas las versiones. Al usar la API Ognl.getValue?, el motor OGNL analiza y evalúa la expresión proporcionada con potentes capacidades, incluyendo el acceso y la invocación de métodos relacionados, etc. Aunque OgnlRuntime intenta restringir ciertas clases y métodos peligrosos (como java.lang.Runtime) a través de una lista negra, estas restricciones no son exhaustivas. Los atacantes podrían eludir las restricciones aprovechando objetos de clase que no están cubiertos por la lista negra y potencialmente lograr la ejecución de código arbitrario. Dado que este proyecto está retirado, no planeamos lanzar una versión que solucione este problema. Se recomienda a los usuarios buscar una alternativa o restringir el acceso a la instancia a usuarios de confianza. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-146"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:commons_ognl:*:*:*:*:*:*:*:*","matchCriteriaId":"C75CE5B2-C8A4-485B-8B03-7ABE62AB1338"}]}]}],"references":[{"url":"https://lists.apache.org/thread/2gj8tjl6vz949nnp3yxz3okm9xz2k7sp","source":"security@apache.org","tags":["Mailing List"]},{"url":"http://www.openwall.com/lists/oss-security/2025/08/18/4","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}