CVE-2026-32613: Spinnaker: RCE via expression parsing due to unrestricted context handling
Echo like some other services, uses SPeL (Spring Expression Language) to process information - specifically around expected artifacts. Unlike orca, it was NOT restricting that context to a set of trusted classes, but allowing FULL JVM access. This enables a user to use arbitrary java classes which allow deep access to the system. This enables the ability to invoke commands, access files, etc.
References
- github.com/advisories/GHSA-69rw-45wj-g4v6
- github.com/spinnaker/spinnaker
- github.com/spinnaker/spinnaker/releases/tag/spinnaker-release-2025.3.2
- github.com/spinnaker/spinnaker/releases/tag/spinnaker-release-2025.4.2
- github.com/spinnaker/spinnaker/releases/tag/spinnaker-release-2026.0.1
- github.com/spinnaker/spinnaker/releases/tag/spinnaker-release-2026.0.2
- github.com/spinnaker/spinnaker/security/advisories/GHSA-69rw-45wj-g4v6
- nvd.nist.gov/vuln/detail/CVE-2026-32613
Code Behaviors & Features
Detect and mitigate CVE-2026-32613 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →