CVE-2026-0542 PUBLISHED

Remote Code Execution in ServiceNow AI Platform

Assigner: SN
Reserved: 30.12.2025 Published: 25.02.2026 Updated: 25.02.2026

ServiceNow has addressed a remote code execution vulnerability that was identified in the ServiceNow AI platform. This vulnerability could enable an unauthenticated user, in certain circumstances, to execute code within the ServiceNow Sandbox.   

ServiceNow addressed this vulnerability by deploying a security update to hosted instances. Relevant security updates also have been provided to ServiceNow self-hosted customers and partners. Further, the vulnerability is addressed in the listed patches and hot fixes. While we are not currently aware of exploitation against customer instances, we recommend customers promptly apply appropriate updates or upgrade if they have not already done so.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 9.2

Product Status

Vendor ServiceNow
Product ServiceNow AI Platform
Versions Default: unaffected
  • affected from 0 to Australia (excl.)
  • affected from 0 to Zurich Patch 5 (excl.)
  • affected from 0 to Zurich Patch 4 Hot Fix 3b (excl.)
  • affected from 0 to Yokohama Patch 12 (excl.)
  • affected from 0 to Yokohama Patch 10 Hot Fix 1b (excl.)
  • affected from 0 to Xanadu Patch 11 Hot Fix 1a (excl.)

Credits

  • Lockheed Martin - Red Team finder

References

Problem Types

  • CWE-653: Improper Isolation or Compartmentalization CWE