CVE-2026-42555 PUBLISHED

Valtimo: SpEL injection via StandardEvaluationContext allows Remote Code Execution by admin users

Assigner: GitHub_M
Reserved: 28.04.2026 Published: 14.05.2026 Updated: 14.05.2026

Valtimo is an open-source business process automation platform. com.ritense.valtimo:document from 12.0.0 to before 12.32.0, com.ritense.valtimo:case from 13.0.0 to before 13.23.0, and com.ritense.valtimo:contract from 13.4.0 to before 13.23.0 evaluate Spring Expression Language (SpEL) expressions from user-supplied input using StandardEvaluationContext, which provides unrestricted access to Java types and methods. An authenticated user with the ADMIN role can achieve Remote Code Execution and credential exfiltration. This vulnerability is fixed in com.ritense.valtimo:document 2.32.0, com.ritense.valtimo:case 13.23.0, and com.ritense.valtimo:contract 13.23.0.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor valtimo-platform
Product valtimo
Versions
  • Version < 13.23.0 is affected
Vendor com.ritense.valtimo
Product case
Versions
  • Version >= 13.0.0, < 13.23.0 is affected
Vendor com.ritense.valtimo
Product contract
Versions
  • Version >= 13.4.0, < 13.23.0 is affected
Vendor com.ritense.valtimo
Product document
Versions
  • Version >= 12.0.0, < 12.32.0 is affected

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE