Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. io.openremote/openremote-manager
  4. ›
  5. CVE-2026-39842

CVE-2026-39842: Expression Injection in OpenRemote

April 14, 2026 (updated April 24, 2026)

The OpenRemote IoT platform’s rules engine contains two interrelated critical expression injection vulnerabilities that allow an attacker to execute arbitrary code on the server, ultimately achieving full server compromise.

  • Unsandboxed Nashorn JavaScript Engine: JavaScript rules are executed via Nashorn’s ScriptEngine.eval() with user-supplied script content and no sandboxing, class filtering, or access restrictions. Critically, any non-superuser with the write:rules role can create JavaScript rulesets.
  • Inactive Groovy Sandbox: The Groovy rules engine has a GroovyDenyAllFilter security filter that is defined but never registered (the registration code is commented out), rendering the SandboxTransformer ineffective. While Groovy rules are restricted to superusers, the absence of sandboxing violates the principle of defense in depth.

References

  • github.com/advisories/GHSA-7mqr-33rv-p3mp
  • github.com/openremote/openremote
  • github.com/openremote/openremote/releases/tag/1.22.0
  • github.com/openremote/openremote/security/advisories/GHSA-7mqr-33rv-p3mp
  • nvd.nist.gov/vuln/detail/CVE-2026-39842

Code Behaviors & Features

Detect and mitigate CVE-2026-39842 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.22.0

Fixed versions

  • 1.22.0

Solution

Upgrade to version 1.22.0 or above.

Impact 9.9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

maven/io.openremote/openremote-manager/CVE-2026-39842.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:19:13 +0000.