<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>GlassFish — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/glassfish/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 22:01:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/glassfish/feed.xml" rel="self" type="application/rss+xml"/><item><title>Eclipse GlassFish EL Injection Vulnerability (CVE-2026-2587) Exploit Publicly Available</title><link>https://feed.craftedsignal.io/briefs/2026-05-glassfish-rce/</link><pubDate>Wed, 20 May 2026 22:01:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-glassfish-rce/</guid><description>A remote code execution vulnerability (CVE-2026-2587) exists in Eclipse GlassFish due to unsanitized user-supplied values in XML attributes being evaluated by the Java Expression Language (EL) engine, and a public exploit is now available.</description><content:encoded><![CDATA[<p>A critical Remote Code Execution vulnerability, CVE-2026-2587, has been identified in Eclipse GlassFish. The vulnerability lies in the GlassFish admin console gadget handler.  The application processes <code>.xml</code> files fetched from a URL supplied via the <code>gadget=</code> query parameter and evaluates user-supplied values inside `` attributes through the Java Expression Language (EL) engine without sanitization. A public exploit PoC has been published, increasing the risk to unpatched GlassFish servers. The exploit, available on Sploitus, targets the <code>/common/gadgets/gadget.jsf</code> endpoint and can be triggered via CSRF if an admin session is active. The vulnerability affects Eclipse GlassFish versions prior to 7.1.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker hosts a malicious XML file containing EL expressions (e.g., <code>#{7*7}</code>) on a server.</li>
<li>Attacker crafts a CSRF page containing an iframe that targets the vulnerable GlassFish instance.</li>
<li>The CSRF page is delivered to a logged-in administrator via email or other means.</li>
<li>The administrator&rsquo;s browser loads the CSRF page, triggering the iframe.</li>
<li>The iframe sends a GET request to <code>/common/gadgets/gadget.jsf</code> with the <code>gadget</code> parameter pointing to the attacker&rsquo;s hosted XML file.</li>
<li>The GlassFish server fetches the XML file from the attacker&rsquo;s server.</li>
<li>The GlassFish server evaluates the EL expression within the <code>ModulePrefs</code> section of the XML file.</li>
<li>If the EL expression contains malicious Java code, the server executes it, leading to remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2587 allows an attacker to execute arbitrary code on the GlassFish server. This could lead to complete system compromise, data theft, denial of service, or further lateral movement within the network. The availability of a public exploit increases the likelihood of exploitation, especially for organizations that have not yet patched their GlassFish instances. The CVSS score of 9.6 indicates the critical severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Eclipse GlassFish to version 7.1.0 or later to patch CVE-2026-2587 (see References).</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-2587 Exploitation Attempt via GET Request&rdquo; to detect exploitation attempts (see Rules).</li>
<li>Implement CSRF protection measures to mitigate the risk of exploitation through compromised administrator sessions (general security best practice).</li>
<li>Monitor web server logs for requests to <code>/common/gadgets/gadget.jsf</code> with unusual <code>gadget</code> parameter values, especially those pointing to external URLs (see References for vulnerable endpoint).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>el-injection</category><category>glassfish</category><category>cve-2026-2587</category></item></channel></rss>