Description
A critical Remote Code Execution (RCE) vulnerability was identified in the server-side template rendering mechanism used by the Glassfish gadget handler. The application processes .xml files and evaluates user-supplied values within a context where Expression Language (EL) “expressions” are processed without proper sanitization or escaping. By injecting expressions such as #{7*7}, the server returns 49, confirming server-side EL evaluation. This issue allows a remote attacker to fully compromise the underlying host, enabling capabilities as reading/modifying data, executing arbitrary commands, persistence, and lateral movement.
Published: 2026-05-19
Score: 9.6 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A critical vulnerability allows remote attackers to execute arbitrary code on servers running the Glassfish gadget handler. The flaw arises from the server’s handling of .xml files wherein user‑supplied values are evaluated as Expression Language (EL) expressions without proper sanitization or escaping. Injecting expressions such as #{7*7} demonstrates that the EL engine evaluates the payload, returning 49, confirming that arbitrary expression evaluation is possible. The vulnerability is classified as CWE‑917, reflecting the dangerous EL injection that can lead to full compromise of the underlying host, including data tampering, command execution, persistence mechanisms, and lateral movement.

Affected Systems

The vulnerability affects the Eclipse Glassfish server, specifically the gadget handler responsible for processing XML payloads. No specific vendor‑supplied version numbers are listed, so any Glassfish installation that includes the gadget handler and processes XML files is potentially at risk. Users should review their deployments for the presence of this component.

Risk and Exploitability

The CVSS score of 9.6 places this issue in the critical severity range, indicating a high impact if exploited. The EPSS score is not available, yet the absence of mitigation and the nature of the flaw suggest a substantial exploitation likelihood for an attacker with the ability to supply XML files. The vulnerability is not listed in the CISA KEV catalog, meaning there is no confirmed public exploitation yet, but the inherent risk remains significant. The most likely attack vector involves a remote attacker uploading a crafted XML file or otherwise feeding malicious EL expressions to the gadget handler, which the server then evaluates in a privileged context.

Generated by OpenCVE AI on May 19, 2026 at 15:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply vendor patch or update to a non‑vulnerable version of Glassfish as soon as an official fix is released
  • Disallow or tightly filter XML file uploads to prevent malicious content from reaching the gadget handler
  • Configure the server to disable EL processing or restrict the expression syntax that can be used within XML payloads
  • Deploy a web application firewall that inspects incoming XML and blocks suspicious EL expressions

Generated by OpenCVE AI on May 19, 2026 at 15:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 15:45:00 +0000

Type Values Removed Values Added
Title Remote Code Execution via Expression Language Injection in Glassfish XML Gadget Handler
First Time appeared Eclipse
Eclipse glassfish
Vendors & Products Eclipse
Eclipse glassfish

Tue, 19 May 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 19 May 2026 14:30:00 +0000

Type Values Removed Values Added
Description A critical Remote Code Execution (RCE) vulnerability was identified in the server-side template rendering mechanism used by the Glassfish gadget handler. The application processes .xml files and evaluates user-supplied values within a context where Expression Language (EL) “expressions” are processed without proper sanitization or escaping. By injecting expressions such as #{7*7}, the server returns 49, confirming server-side EL evaluation. This issue allows a remote attacker to fully compromise the underlying host, enabling capabilities as reading/modifying data, executing arbitrary commands, persistence, and lateral movement.
Weaknesses CWE-917
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}


Subscriptions

Eclipse Glassfish
cve-icon MITRE

Status: PUBLISHED

Assigner: eclipse

Published:

Updated: 2026-05-19T14:40:24.843Z

Reserved: 2026-02-16T14:14:23.896Z

Link: CVE-2026-2587

cve-icon Vulnrichment

Updated: 2026-05-19T14:40:21.559Z

cve-icon NVD

Status : Received

Published: 2026-05-19T15:16:28.577

Modified: 2026-05-19T15:16:28.577

Link: CVE-2026-2587

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T15:30:08Z

Weaknesses