Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.continuum/continuum
  4. ›
  5. CVE-2016-15057

CVE-2016-15057: Apache Continuum vulnerable to Command Injection through Installations REST API

January 26, 2026

UNSUPPORTED WHEN ASSIGNED

Improper Neutralization of Special Elements used in a Command (‘Command Injection’) vulnerability in Apache Continuum.

This issue affects Apache Continuum: all versions.

Attackers with access to the Installations REST API can use this to invoke arbitrary commands on the server.

As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

References

  • github.com/advisories/GHSA-77p9-w6pj-rmvg
  • github.com/apache/continuum
  • lists.apache.org/thread/hbvf1ztqw2kv51khvzm5nk3mml3nm4z1
  • nvd.nist.gov/vuln/detail/CVE-2016-15057

Code Behaviors & Features

Detect and mitigate CVE-2016-15057 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.4.2

Solution

Unfortunately, there is no solution available yet.

Impact 9.9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')

Source file

maven/org.apache.continuum/continuum/CVE-2016-15057.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:36:10 +0000.