Spinnaker: RCE via expression parsing due to unrestricted context handling
Critical severity
GitHub Reviewed
Published
Apr 20, 2026
in
spinnaker/spinnaker
•
Updated Apr 21, 2026
Package
Affected versions
>= 2026.0-0, < 2026.0.1
>= 2025.4-0, < 2025.4.2
< 2025.3.2
Patched versions
2026.0.1
2025.4.2
2025.3.2
Description
Published by the National Vulnerability Database
Apr 20, 2026
Published to the GitHub Advisory Database
Apr 21, 2026
Reviewed
Apr 21, 2026
Last updated
Apr 21, 2026
Impact
Echo like some other services, uses SPeL (Spring Expression Language) to process information - specifically around expected artifacts. Unlike orca, it was NOT restricting that context to a set of trusted classes, but allowing FULL JVM access. This enables a user to use arbitrary java classes which allow deep access to the system. This enables the ability to invoke commands, access files, etc.
Workarounds
Disable echo entirely.
References