Description
Description:
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Atlas
Apache Atlas exposes a DSL search endpoint that accepts user-supplied query strings. Attacker can alter Gremlin traversal logic within grammar-allowed characters to access unintended data




Affect Version:
This issue affects Apache Atlas: from 0.8 through 2.4.0.



For the affect version >= 2.0, vulnerability is only when Atlas is deployed with below non-default configuration.


atlas.dsl.executor.traversal=false



Mitigation:
Users are recommended to upgrade to version 2.5.0, which fixes the issue.
Published: 2026-05-04
Score: 7.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Apache Atlas contains a code injection flaw in its DSL search endpoint that allows an attacker to manipulate Gremlin traversal logic within the accepted grammar. By supplying a crafted query string, the attacker can modify the internal traversal logic and retrieve data not intended to be exposed. This vulnerability is classified under CWE‑94 and can lead to unauthorized access to sensitive data stored in Atlas.

Affected Systems

The flaw affects Apache Atlas versions 0.8 through 2.4.0. For installations running Atlas 2.0 or newer the issue is only triggered when the configuration parameter atlas.dsl.executor.traversal is set to false. All other default deployments are unaffected.

Risk and Exploitability

The CVSS score of 7.1 indicates a medium to high severity. No EPSS value is currently available, so the precise exploitation likelihood cannot be quantified, but the vulnerability is included in the public advisory and is not yet listed in the CISA KEV catalog. Attackers can target the exposed DSL endpoint over the network, and because the flaw does not require privileged input beyond a crafted query, the practical barrier to entry is low. The potential impact of data exposure combined with moderate exploitation risk warrants prompt remediation.

Generated by OpenCVE AI on May 4, 2026 at 17:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache Atlas to version 2.5.0 or later, which removes the code‑injection vector.
  • If an upgrade cannot be performed immediately, set the configuration parameter atlas.dsl.executor.traversal to true to disable the vulnerable traversal capability.
  • Additionally, implement input validation on user‑supplied DSL queries to whitelist allowed syntax and reject any that contain suspicious traversal constructs.

Generated by OpenCVE AI on May 4, 2026 at 17:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache atlas
Vendors & Products Apache
Apache atlas

Mon, 04 May 2026 16:30:00 +0000

Type Values Removed Values Added
References

Mon, 04 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 16:00:00 +0000

Type Values Removed Values Added
Description Description: Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Atlas Apache Atlas exposes a DSL search endpoint that accepts user-supplied query strings. Attacker can alter Gremlin traversal logic within grammar-allowed characters to access unintended data Affect Version: This issue affects Apache Atlas: from 0.8 through 2.4.0. For the affect version >= 2.0, vulnerability is only when Atlas is deployed with below non-default configuration. atlas.dsl.executor.traversal=false Mitigation: Users are recommended to upgrade to version 2.5.0, which fixes the issue.
Title Apache Atlas: Script injection allows access to unintended data
Weaknesses CWE-94
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-05-04T16:04:26.483Z

Reserved: 2026-04-14T12:05:23.666Z

Link: CVE-2026-40563

cve-icon Vulnrichment

Updated: 2026-05-04T15:43:57.213Z

cve-icon NVD

Status : Received

Published: 2026-05-04T16:16:02.283

Modified: 2026-05-04T17:16:23.500

Link: CVE-2026-40563

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T19:00:06Z

Weaknesses