CVE-2026-35086
Code Injection in Apache OFBiz Email Services
Publication date: 2026-05-19
Last updated on: 2026-05-19
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | ofbiz | to 24.09.06 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Improper Control of Generation of Code, also known as a 'Code Injection' vulnerability, found in the email services of Apache OFBiz. It allows attackers to inject and execute arbitrary code due to insufficient control over code generation.
How can this vulnerability impact me? :
The vulnerability can allow attackers to execute arbitrary code within the affected Apache OFBiz email services. This can lead to unauthorized actions, data compromise, or disruption of service.
What immediate steps should I take to mitigate this vulnerability?
Users are recommended to upgrade Apache OFBiz to version 24.09.06, which fixes the improper code injection vulnerability in the email services.