
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical security vulnerability (CVE-2025-53192) has been identified in Apache Commons OGNL affecting all versions of the software. The vulnerability was disclosed on August 18, 2025, and is classified as an Improper Neutralization of Expression/Command Delimiters vulnerability. This issue specifically affects the Apache Commons OGNL library, which is now in an unsupported state (NVD Database).
The vulnerability occurs in the Ognl.getValue API implementation where the OGNL engine parses and evaluates provided expressions with extensive capabilities. While OgnlRuntime implements a blocklist to restrict dangerous classes and methods like java.lang.Runtime, these restrictions are not comprehensive. The vulnerability has received a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, indicating its severe nature (NVD Database).
The vulnerability allows attackers to potentially achieve arbitrary code execution by bypassing the existing security restrictions through leveraging class objects not covered by the blocklist. This poses a significant security risk as it could lead to complete system compromise (NVD Database).
As the project is retired, no official fix will be released. Users are strongly recommended to either find an alternative solution or restrict access to the instance to trusted users only. The maintainers have explicitly stated they do not plan to release a version that fixes this issue (NVD Database).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."