GHSA-77p9-w6pj-rmvg

Suggest an improvement
Source
https://github.com/advisories/GHSA-77p9-w6pj-rmvg
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-77p9-w6pj-rmvg/GHSA-77p9-w6pj-rmvg.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-77p9-w6pj-rmvg
Aliases
  • CVE-2016-15057
Published
2026-01-26T12:30:29Z
Modified
2026-01-27T00:12:07.844265Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Apache Continuum vulnerable to Command Injection through Installations REST API
Details

UNSUPPORTED WHEN ASSIGNED

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Continuum.

This issue affects Apache Continuum: all versions.

Attackers with access to the Installations REST API can use this to invoke arbitrary commands on the server.

As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Database specific
{
    "cwe_ids": [
        "CWE-77"
    ],
    "severity": "CRITICAL",
    "nvd_published_at": "2026-01-26T12:15:46Z",
    "github_reviewed": true,
    "github_reviewed_at": "2026-01-26T23:45:16Z"
}
References

Affected packages

Maven / org.apache.continuum:continuum

Package

Name
org.apache.continuum:continuum
View open source insights on deps.dev
Purl
pkg:maven/org.apache.continuum/continuum

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.4.2

Affected versions

1.*

1.2
1.2.2
1.2.3
1.3.1
1.3.2
1.3.3
1.3.4
1.3.5
1.3.6
1.3.7
1.3.8
1.4.0
1.4.1
1.4.2

Database specific

source

"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-77p9-w6pj-rmvg/GHSA-77p9-w6pj-rmvg.json"