An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.

Project Subscriptions

Vendors Products
Velocity Engine Subscribe
Debian Linux Subscribe
Banking Deposits And Lines Of Credit Servicing Subscribe
Banking Enterprise Default Management Subscribe
Banking Loans Servicing Subscribe
Banking Party Management Subscribe
Banking Platform Subscribe
Communications Cloud Native Core Policy Subscribe
Communications Network Integrity Subscribe
Hospitality Token Proxy Service Subscribe
Retail Integration Bus Subscribe
Retail Order Broker Subscribe
Retail Service Backbone Subscribe
Retail Xstore Office Cloud Service Subscribe
Utilities Testing Accelerator Subscribe
Camel Quarkus Subscribe
Integration Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Application Platform Eus Subscribe
Jboss Fuse Subscribe
Jbosseapxp Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2595-1 velocity security update
Github GHSA Github GHSA GHSA-59j4-wjwp-mw9m Sandbox Bypass in Apache Velocity Engine
Ubuntu USN Ubuntu USN USN-6281-1 Velocity Engine vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

Applications using Apache Velocity that allow untrusted users to upload templates should upgrade to version 2.3. This version adds additional default restrictions on what methods/properties can be accessed in a template.

References
Link Providers
http://www.openwall.com/lists/oss-security/2021/03/10/1 cve-icon cve-icon
https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a%40%3Cuser.velocity.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r0bc98e9cd080b4a13b905c571b9bed87e1a0878d44dbf21487c6cca4%40%3Cdev.santuario.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r17cb932fab14801b14e5b97a7f05192f4f366ef260c10d4a8dba8ac9%40%3Cdev.ws.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r293284c6806c73f51098001ea86a14271c39f72cd76af9e946d9d9ad%40%3Cdev.ws.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r39de20c7e9c808b1f96790875d33e58c9c0aabb44fd9227e7b3dc5da%40%3Cdev.ws.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3ea4c4c908505b20a4c268330dfe7188b90c84dcf777728d02068ae6%40%3Cannounce.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r4cd59453b65d4ac290fcb3b71fdf32b4f1f8989025e89558deb5a245%40%3Cdev.ws.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328%40%3Cusers.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r7f209b837217d2a0fe5977fb692e7f15d37fa5de8214bcdc4c21d9a7%40%3Ccommits.turbine.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882%40%3Cusers.activemq.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6%40%3Ccommits.velocity.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rbee7270556f4172322936b5ecc9fabf0c09f00d4fa56c9de1963c340%40%3Cdev.ws.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd2a89e17e8a9b451ce655f1a34117752ea1d18a22ce580d8baa824fd%40%3Ccommits.druid.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd7e865c87f9043c21d9c1fd9d4df866061d9a08cfc322771160d8058%40%3Cdev.ws.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re641197d204765130618086238c73dd2ce5a3f94b33785b587d72726%40%3Cdev.ws.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re8e7482fe54d289fc0229e61cc64947b63b12c3c312e9f25bf6f3b8c%40%3Cdev.ws.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/reab5978b54a9f4c078402161e30a89c42807b198814acadbe6c862c7%40%3Cdev.ws.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf7d369de88dc88a1347006a3323b3746d849234db40a8edfd5ebc436%40%3Cdev.ws.apache.org%3E cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2021/03/msg00019.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2020-13936 cve-icon
https://security.gentoo.org/glsa/202107-52 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2020-13936 cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.12103}

epss

{'score': 0.10626}


Tue, 25 Feb 2025 02:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Eus
CPEs cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7
cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7
Vendors & Products Redhat jboss Enterprise Application Platform Eus

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-02-13T16:27:29.361Z

Reserved: 2020-06-08T00:00:00.000Z

Link: CVE-2020-13936

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-03-10T08:15:14.103

Modified: 2024-11-21T05:02:11.127

Link: CVE-2020-13936

cve-icon Redhat

Severity : Important

Publid Date: 2021-03-09T00:00:00Z

Links: CVE-2020-13936 - Bugzilla

cve-icon OpenCVE Enrichment

No data.