CVE-2026-6264 PUBLISHED

Critical Security fix for the Talend JobServer and Talend Runtime

Assigner: Bugcrowd
Reserved: 14.04.2026 Published: 14.04.2026 Updated: 14.04.2026

A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Talend ESB Runtime, the vulnerability can be mitigated by disabling the JobServer JMX monitoring port, which is disabled by default from the R2024-07-RT patch.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8

Product Status

Vendor Talend
Product Talend JobServer
Versions Default: unaffected
  • affected from 8.0 to TPS-6017 (excl.)
  • affected from 7.3 to TPS-6018 (excl.)
Vendor Talend
Product Talend Runtime
Versions Default: unaffected
  • affected from 8.0 to 8.0.1.R2026-01-RT (excl.)
  • affected from 7.3 to 7.3.1-R2026-01 (excl.)

Credits

  • Harpreet Singh (@TheCyb3rAlphaProfession), Security Researcher

References

Problem Types

  • CWE-306 Missing Authentication for Critical Function