An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2595-1 | velocity security update |
![]() |
GHSA-59j4-wjwp-mw9m | Sandbox Bypass in Apache Velocity Engine |
![]() |
USN-6281-1 | Velocity Engine vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
Applications using Apache Velocity that allow untrusted users to upload templates should upgrade to version 2.3. This version adds additional default restrictions on what methods/properties can be accessed in a template.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 25 Feb 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat jboss Enterprise Application Platform Eus
|
|
CPEs | cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7 cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.3::el7 |
|
Vendors & Products |
Redhat jboss Enterprise Application Platform Eus
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T16:27:29.361Z
Reserved: 2020-06-08T00:00:00.000Z
Link: CVE-2020-13936

No data.

Status : Modified
Published: 2021-03-10T08:15:14.103
Modified: 2024-11-21T05:02:11.127
Link: CVE-2020-13936


No data.