CVE-2026-41883
Description
OmniFaces is a utility library for Faces. Prior to versions 1.14.2, 2.7.32, 3.14.16, 4.7.5, and 5.2.3, there is a server-side EL injection leading to Remote Code Execution (RCE). This affects applications that use CDNResourceHandler with a wildcard CDN mapping (e.g. libraryName:*=https://cdn.example.com/*). An attacker can craft a resource request URL containing an EL expression in the resource name, which is evaluated server-side. This issue has been patched in versions 1.14.2, 2.7.32, 3.14.16, 4.7.5, and 5.2.3.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A server-side EL injection in OmniFaces' CDNResourceHandler allows RCE when a wildcard CDN mapping is used.
Vulnerability
Overview
CVE-2026-41883 is a server-side Expression Language (EL) injection vulnerability in the OmniFaces library for Java Faces. The flaw resides in the CDNResourceHandler component when configured with a wildcard CDN mapping, such as libraryName:*=https://cdn.example.com/* [1][3]. An attacker can craft a resource request URL containing an EL expression in the resource name, which is then evaluated by the server [3].
Attack
Vector
The vulnerability is exploitable by sending a specially crafted HTTP request to a web application using the affected configuration. No authentication is required, as the request is processed during resource handling [1]. The EL injection occurs because the resource name from the URL is not sanitized before being used in EL evaluation [3].
Impact
Successful exploitation results in server-side EL injection, which can lead to remote code execution (RCE) depending on the EL implementation and available objects in the context [3]. At a minimum, an attacker can achieve information disclosure and denial of service denial [3]. Applications using only explicit (non-wildcard) mappings are not affected [1][3].
Mitigation
Mitigation
Mitigation
The issue has been patched in OmniFaces versions 1.14.2, 2.7.32, 3.14.16, 4.7.5, and 5.2.3 [1][1][3]. As a workaround, administrators can replace wildcard CDN mappings with explicit resource-to-URL mappings to prevent injection [3].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.omnifaces:omnifacesMaven | < 1.14.2 | 1.14.2 |
org.omnifaces:omnifacesMaven | >= 2.0-RC1, < 2.7.32 | 2.7.32 |
org.omnifaces:omnifacesMaven | >= 3.0-RC1, < 3.14.16 | 3.14.16 |
org.omnifaces:omnifacesMaven | >= 4.0-M1, < 4.7.5 | 4.7.5 |
org.omnifaces:omnifacesMaven | >= 5.0-M1, < 5.2.3 | 5.2.3 |
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.