CVE-2020-13942

Remote Code Execution in Apache Unomi

Basic Information

CVE State
PUBLISHED
Reserved Date
June 08, 2020
Published Date
November 24, 2020
Last Updated
February 13, 2025
Vendor
Apache Software Foundation
Product
Apache Unomi
Description
It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.
Tags
apache nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2.0

7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS Score

Score
94.05% (Percentile: 99.89%) as of 2025-06-02

Exploit Status

Exploited in the Wild
Yes (added 2025-05-10 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-10 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

Prodrious/CVE-2020-13942

Type: github • Created: 2021-09-05 16:39:19 UTC • Stars: 0

yaunsky/Unomi-CVE-2020-13942

Type: github • Created: 2020-12-22 02:57:50 UTC • Stars: 4

CVE-2020-13942 Apache Unomi 远程代码执行漏洞脚getshell

blackmarketer/CVE-2020-13942

Type: github • Created: 2020-11-21 08:48:46 UTC • Stars: 3

shifa123/CVE-2020-13942-POC-

Type: github • Created: 2020-11-20 23:25:44 UTC • Stars: 9

CVE-2020-13942 POC + Automation Script

eugenebmx/CVE-2020-13942

Type: github • Created: 2020-11-19 08:22:17 UTC • Stars: 28

CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection

lp008/CVE-2020-13942

Type: github • Created: 2020-11-18 10:29:47 UTC • Stars: 6

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel