Multiple classes evaluate Spring Expression Language (SpEL) expressions from user-supplied input using StandardEvaluationContext, which provides unrestricted access to Java types and methods. An authenticated user with the ADMIN role can achieve Remote Code Execution and credential exfiltration.
An attacker with ADMIN credentials can:
- Execute arbitrary OS commands via T(java.lang.Runtime).getRuntime().exec('...')
- Exfiltrate all environment variables (database passwords, API keys, Keycloak secrets) via T(java.lang.System).getenv()
- Read JVM system properties via T(java.lang.System).getProperties()
- Load arbitrary classes via T(java.lang.Class).forName('...')
1. DocumentMigrationService (since 12.0.0)
Exploitable through the document migration REST API:
- POST /api/management/v1/document-definition/migrate
- POST /api/management/v1/document-definition/migration/conflicts
The malicious SpEL expression is supplied in the source or target field of a DocumentMigrationPatch object in the request body, using the ${...} template syntax.
com.ritense.document.service.DocumentMigrationService#handleSpelExpression (document module)2. Condition (since 13.4.0)
Exploitable through any admin-configured widget, dashboard, or feature that uses the Condition framework. The SpEL expression is supplied in the value field of a condition's JSON configuration.
com.ritense.valtimo.contract.conditions.Condition#resolveValue (contract module)This component has a significantly wider attack surface than DocumentMigrationService, as conditions are used across many modules.
Replace StandardEvaluationContext with SimpleEvaluationContext in both affected classes, which disallows Java type references and arbitrary method invocation:
val evaluationContext = SimpleEvaluationContext
.forPropertyAccessors(MapAccessor(), jsonPropertyAccessor)
.build()
{
"github_reviewed": true,
"github_reviewed_at": "2026-05-06T21:41:44Z",
"cwe_ids": [
"CWE-94"
],
"severity": "CRITICAL",
"nvd_published_at": null
}