CVE-2025-53192

NameCVE-2025-53192
Description** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Expression/Command Delimiters vulnerability in Apache Commons OGNL. This issue affects Apache Commons OGNL: all versions. When using the API Ognl.getValue​, the OGNL engine parses and evaluates the provided expression with powerful capabilities, including accessing and invoking related methods, etc. Although OgnlRuntime attempts to restrict certain dangerous classes and methods (such as java.lang.Runtime) through a blocklist, these restrictions are not comprehensive. Attackers may be able to bypass the restrictions by leveraging class objects that are not covered by the blocklist and potentially achieve arbitrary code execution. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1111588

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ognl (PTS)bookworm, bullseye2.7.3-7vulnerable
forky, sid, trixie2.7.3-8vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ognlsource(unstable)(unfixed)1111588

Notes

[trixie] - ognl <no-dsa> (Minor issue)
[bookworm] - ognl <no-dsa> (Minor issue)
[bullseye] - ognl <postponed> (Minor issue)
https://www.openwall.com/lists/oss-security/2025/08/18/4
https://lists.apache.org/thread/2gj8tjl6vz949nnp3yxz3okm9xz2k7sp

Search for package or bug name: Reporting problems