CVE-2020-26217
HIGH NUCLEIXstream < 1.4.14 - OS Command Injection
Title source: ruleDescription
XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.
Exploits (8)
github
WORKING POC
5 stars
by JAckLosingHeart · javapoc
https://github.com/JAckLosingHeart/CVE-PoC-Collection/tree/main/xstream-CVE-2020-26217
nomisec
WORKING POC
4 stars
by novysodope · poc
https://github.com/novysodope/CVE-2020-26217-XStream-RCE-POC
nomisec
WORKING POC
by shoucheng3 · poc
https://github.com/shoucheng3/x-stream__xstream_CVE-2020-26217_1-4-14-java77
Nuclei Templates (1)
XStream <1.4.14 - Remote Code Execution
HIGHby pwnhxl,vicrack
References (15)
Scores
CVSS v3
8.0
EPSS
0.9357
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
Classification
CWE
CWE-78
Status
published
Affected Products (38)
xstream/xstream
< 1.4.14
debian/debian_linux
debian/debian_linux
netapp/snapmanager
netapp/snapmanager
apache/activemq
< 5.15.14
apache/activemq
oracle/banking_cash_management
oracle/banking_cash_management
oracle/banking_cash_management
oracle/banking_corporate_lending_process_management
oracle/banking_corporate_lending_process_management
oracle/banking_corporate_lending_process_management
oracle/banking_credit_facilities_process_management
oracle/banking_credit_facilities_process_management
... and 23 more
Timeline
Published
Nov 16, 2020
Tracked Since
Feb 18, 2026