VYPR
High severity8.8NVD Advisory· Published May 19, 2026· Updated May 20, 2026

CVE-2026-46586

CVE-2026-46586

Description

Improper Control of Generation of Code ('Code Injection'), Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') vulnerability in Apache OFBiz.

This issue affects Apache OFBiz: before 24.09.06.

Users are recommended to upgrade to version 24.09.06, which fixes the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated code injection in Apache OFBiz traverseContent service allows Groovy code execution before 24.09.06.

Vulnerability

An improper control of code generation (code injection) and improper neutralization of directives in dynamically evaluated code (eval injection) vulnerability exists in Apache OFBiz versions before 24.09.06 [1]. The flaw resides in the traverseContent service, which fails to properly validate user-supplied input, enabling the injection of arbitrary Groovy code. Versions prior to 24.09.06 are affected; version 24.09.06 fixed the issue.

Exploitation

Exploitation requires authenticated access to the OFBiz application [1]. An attacker with valid credentials can send crafted requests to the traverseContent service, supplying malicious Groovy code in parameters that are not sanitized. The service then dynamically evaluates this code, resulting in code execution on the server.

Impact

Successful exploitation allows an authenticated attacker to execute arbitrary Groovy code on the server, leading to full compromise of the application's confidentiality, integrity, and availability (CIA). The attacker gains the same privileges as the running OFBiz process, which typically has broad access to the underlying system.

Mitigation

Apache OFBiz version 24.09.06, released on or before 2026-05-19, contains the fix for this vulnerability [1]. Users must upgrade to version 24.09.06 or later. No workarounds or alternative mitigations are documented in the references. This CVE is not listed on CISA's Known Exploited Vulnerabilities (KEV) catalog as of the publication date.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.