Improper Sandboxing in Google Apigee's JavaCallout Policy Allows for Remote Code Execution
CVE-2025-13426

8.7HIGH

Key Information:

Vendor
CVE Published:
5 December 2025

What is CVE-2025-13426?

A vulnerability exists in Google Apigee's JavaCallout policy https://docs.apigee.com/api-platform/reference/policies/java-callout-policy that allows for remote code execution.

It is possible for a user to write a JavaCallout that injected a malicious object into the MessageContext to execute arbitrary Java code and system commands at runtime, leading to unauthorized access to data, lateral movement within the network, and access to backend systems.

The Apigee hybrid versions below have all been updated to protect from this vulnerability:

  • Hybrid_1.11.2+
  • Hybrid_1.12.4+
  • Hybrid_1.13.3+
  • Hybrid_1.14.1+
  • OPDK_5202+
  • OPDK_5300+

Affected Version(s)

Apigee hybrid Javacallout policy 0

Apigee hybrid Javacallout policy 0

Apigee hybrid Javacallout policy 0

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Nikita Markevich
.
CVE-2025-13426 : Remote Code Execution Vulnerability in Google Apigee JavaCallout Policy