Remote Code Execution Vulnerability in Glassfish Gadget Handler from Eclipse
CVE-2026-2587
Key Information:
- Vendor
Eclipse Foundation
- Status
- Vendor
- CVE Published:
- 19 May 2026
Badges
What is CVE-2026-2587?
A serious Remote Code Execution vulnerability exists in the server-side template rendering mechanism of the Glassfish gadget handler. This flaw arises from the improper handling of user-supplied values in .xml files, which allows attackers to inject expressions that are evaluated without adequate sanitization. By executing these expressions, an attacker can gain complete control over the affected server, enabling them to read or modify sensitive data, execute arbitrary commands, and achieve persistence within the network. This vulnerability highlights the critical need for robust input validation and secure coding practices in server applications.
Affected Version(s)
Eclipse Glassfish 8.0.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved
