Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 15 May 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Code Execution via Unrestricted ScriptRunner in Oinone Pamirs 7.0.0 |
Fri, 15 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Code Execution via Unrestricted ScriptRunner in Oinone Pamirs 7.0.0 |
Fri, 15 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Fri, 15 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Oinone Pamirs 7.0.0 contains a code execution vulnerability via ScriptRunner. The method ScriptRunner.run(String expression, String type, Map<String, Object> context) evaluates attacker-controlled script expressions through the underlying script engine without sandboxing or allowlist restrictions. | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-15T15:32:09.988Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-39052
Updated: 2026-05-15T15:32:05.721Z
Status : Received
Published: 2026-05-15T15:16:51.490
Modified: 2026-05-15T16:16:14.617
Link: CVE-2026-39052
No data.
OpenCVE Enrichment
Updated: 2026-05-15T17:30:04Z