Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-69rw-45wj-g4v6 | Spinnaker: RCE via expression parsing due to unrestricted context handling |
Thu, 23 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation spinnaker |
|
| CPEs | cpe:2.3:a:linuxfoundation:spinnaker:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation spinnaker |
Thu, 23 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Spinnaker
Spinnaker spinnaker |
|
| Vendors & Products |
Spinnaker
Spinnaker spinnaker |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Spinnaker is an open source, multi-cloud continuous delivery platform. Echo like some other services, uses SPeL (Spring Expression Language) to process information - specifically around expected artifacts. In versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2, unlike orca, it was NOT restricting that context to a set of trusted classes, but allowing FULL JVM access. This enabled a user to use arbitrary java classes which allow deep access to the system. This enabled the ability to invoke commands, access files, etc. Versions 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2 contain a patch. As a workaround, disable echo entirely. | |
| Title | Spinnaker vulnerable to RCE via expression parsing due to unrestricted context handling | |
| Weaknesses | CWE-94 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-23T16:30:05.001Z
Reserved: 2026-03-12T14:54:24.271Z
Link: CVE-2026-32613
Updated: 2026-04-23T16:30:05.001Z
Status : Analyzed
Published: 2026-04-20T21:16:32.623
Modified: 2026-04-23T18:30:37.510
Link: CVE-2026-32613
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:47:15Z
Github GHSA