CVE-2020-13942
Remote Code Execution in Apache Unomi
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- June 08, 2020
- Published Date
- November 24, 2020
- Last Updated
- February 13, 2025
- Vendor
- Apache Software Foundation
- Product
- Apache Unomi
- Description
- It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.
- Tags
- Score
- 94.05% (Percentile: 99.89%) as of 2025-06-02
- Exploited in the Wild
- Yes (added 2025-05-10 00:00:00 UTC) Source
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS Score
Exploit Status
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-05-10 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-13942.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
Prodrious/CVE-2020-13942
Type: github • Created: 2021-09-05 16:39:19 UTC • Stars: 0
yaunsky/Unomi-CVE-2020-13942
Type: github • Created: 2020-12-22 02:57:50 UTC • Stars: 4
blackmarketer/CVE-2020-13942
Type: github • Created: 2020-11-21 08:48:46 UTC • Stars: 3
shifa123/CVE-2020-13942-POC-
Type: github • Created: 2020-11-20 23:25:44 UTC • Stars: 9
eugenebmx/CVE-2020-13942
Type: github • Created: 2020-11-19 08:22:17 UTC • Stars: 28
lp008/CVE-2020-13942
Type: github • Created: 2020-11-18 10:29:47 UTC • Stars: 6
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Detected by Nuclei
-
Added to KEVIntel