
Cloud Vulnerability DB
A community-led vulnerabilities database
Orkes Conductor v3.21.11 allows remote attackers to execute arbitrary OS commands through unrestricted access to Java classes. The vulnerability was discovered on June 30, 2025, and affects the core functionality of the Conductor workflow orchestration platform (NVD, Medium Blog).
The vulnerability stems from the unsafe use of the Nashorn JavaScript engine without proper restrictions in Conductor's Inline tasks. The flaw occurs when Nashorn is executed without the --no-java flag and no sandboxing or input validation is in place. This allows attackers to inject Java code directly through inline JavaScript, enabling arbitrary code execution. The vulnerability has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD, Medium Blog).
The vulnerability allows attackers to gain full remote shell access on the server running Conductor. Through a malicious workflow containing specially crafted JavaScript code, attackers can execute arbitrary OS commands, potentially leading to complete system compromise (Medium Blog).
Organizations should immediately upgrade to Conductor version 3.21.13 or later. Additional security measures include: never exposing Conductor OSS to the Internet, limiting who can define or update workflows, and ensuring proper access controls are in place (Medium Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."