🔐 CVE Alert

CVE-2026-2587

CRITICAL 9.6
CVSS Score
9.6
EPSS Score
0.0%
EPSS Percentile
0th

A critical Remote Code Execution (RCE) vulnerability was identified in the server-side template rendering mechanism used by the Glassfish gadget handler. The application processes .xml files and evaluates user-supplied values within a context where Expression Language (EL) “expressions” are processed without proper sanitization or escaping. By injecting expressions such as #{7*7}, the server returns 49, confirming server-side EL evaluation. This issue allows a remote attacker to fully compromise the underlying host, enabling capabilities as reading/modifying data, executing arbitrary commands, persistence, and lateral movement.

CWE CWE-917
Vendor eclipse foundation
Product eclipse glassfish
Published May 19, 2026
Last Updated May 20, 2026
Stay Ahead of the Next One

Get instant alerts for eclipse foundation eclipse glassfish

Be the first to know when new critical vulnerabilities affecting eclipse foundation eclipse glassfish are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Eclipse Foundation / Eclipse Glassfish
All versions affected

References

NVD ↗ CVE.org ↗ EPSS Data ↗
gitlab.eclipse.org: https://gitlab.eclipse.org/security/cve-assignment/-/issues/86

Credits

Camilo G. AkA Dedalo (DeepSecurity Perú)