Description
A vulnerability was identified in xiandafu beetl up to 3.20.2. Affected is an unknown function of the file beetl-classic-integration/beetl-spring-classic/src/main/java/org/beetl/ext/spring/SpELFunction.java of the component SpELFunction. The manipulation leads to improper neutralization of special elements used in an expression language statement. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-17
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A vulnerability exists in xiandafu beetl through version 3.20.2 that allows an attacker to inject unfiltered expressions into an SpEL function. The improper neutralization of special elements in the expression language can lead to execution of arbitrary code when the expression is evaluated. Publicly available exploits demonstrate that remote exploitation is feasible, and the project has not yet released a fix.

Affected Systems

The affected product is xiandafu beetl. Versions up to and including 3.20.2 are vulnerable; the SpELFunction component under beetl-classic-integration/beetl-spring-classic is the point of weakness.

Risk and Exploitability

The CVSS score is 6.9, indicating a moderate to high severity. EPSS data are not available, and the vulnerability is not listed in CISA KEV. Because remote exploitation is possible and exploits are publicly available, the risk is significant. The attack likely occurs when an attacker can supply or influence Expression Language statements that invoke SpELFunction.

Generated by OpenCVE AI on May 17, 2026 at 15:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Determine if the installed beetl version is 3.20.2 or earlier; this is the affected range.
  • If a newer version of beetl with a fixed SpELFunction exists, upgrade immediately; if no patch is available yet, remove or comment out the SpELFunction integration from your Spring configuration.
  • Restrict the use of SpEL expressions so that only trusted, authenticated components can provide expressions, and implement input validation or escaping for any expression data that comes from external sources.

Generated by OpenCVE AI on May 17, 2026 at 15:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 17 May 2026 14:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in xiandafu beetl up to 3.20.2. Affected is an unknown function of the file beetl-classic-integration/beetl-spring-classic/src/main/java/org/beetl/ext/spring/SpELFunction.java of the component SpELFunction. The manipulation leads to improper neutralization of special elements used in an expression language statement. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
Title xiandafu beetl SpELFunction SpELFunction.java expression language injection
First Time appeared Xiandafu
Xiandafu beetl
Weaknesses CWE-20
CWE-917
CPEs cpe:2.3:a:xiandafu:beetl:*:*:*:*:*:*:*:*
Vendors & Products Xiandafu
Xiandafu beetl
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-17T14:15:42.240Z

Reserved: 2026-05-16T17:44:58.119Z

Link: CVE-2026-8759

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-17T15:16:20.843

Modified: 2026-05-17T15:16:20.843

Link: CVE-2026-8759

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-17T16:00:05Z

Weaknesses