๐Ÿ” CVE Alert

CVE-2026-42555

CRITICAL 9.1

Valtimo: SpEL injection via StandardEvaluationContext allows Remote Code Execution by admin users

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

Valtimo is an open-source business process automation platform. com.ritense.valtimo:document from 12.0.0 to before 12.32.0, com.ritense.valtimo:case from 13.0.0 to before 13.23.0, and com.ritense.valtimo:contract from 13.4.0 to before 13.23.0 evaluate Spring Expression Language (SpEL) expressions from user-supplied input using StandardEvaluationContext, which provides unrestricted access to Java types and methods. An authenticated user with the ADMIN role can achieve Remote Code Execution and credential exfiltration. This vulnerability is fixed in com.ritense.valtimo:document 2.32.0, com.ritense.valtimo:case 13.23.0, and com.ritense.valtimo:contract 13.23.0.

CWE CWE-94
Vendor valtimo-platform
Product valtimo
Published May 14, 2026
Last Updated May 14, 2026
Stay Ahead of the Next One

Get instant alerts for valtimo-platform valtimo

Be the first to know when new critical vulnerabilities affecting valtimo-platform valtimo are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

valtimo-platform / valtimo
< 13.23.0
com.ritense.valtimo / case
>= 13.0.0, < 13.23.0
com.ritense.valtimo / contract
>= 13.4.0, < 13.23.0
com.ritense.valtimo / document
>= 12.0.0, < 12.32.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/valtimo-platform/valtimo/security/advisories/GHSA-j7j9-5253-f7vh