Improper Neutralization Affecting ognl package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN12-OGNL-12029331
  • published21 Aug 2025
  • disclosed18 Aug 2025

Introduced: 18 Aug 2025

NewCVE-2025-53192  (opens in a new tab)
CWE-146  (opens in a new tab)

How to fix?

There is no fixed version for Debian:12 ognl.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ognl package and not the ognl package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Expression/Command Delimiters vulnerability in Apache Commons OGNL.

This issue affects Apache Commons OGNL: all versions.

When using the API Ognl.getValue​, the OGNL engine parses and evaluates the provided expression with powerful capabilities, including accessing and invoking related methods, etc. Although OgnlRuntime attempts to restrict certain dangerous classes and methods (such as java.lang.Runtime) through a blocklist, these restrictions are not comprehensive. Attackers may be able to bypass the restrictions by leveraging class objects that are not covered by the blocklist and potentially achieve arbitrary code execution.

As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer.