[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-32613":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-21T11:17:02.443Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":32,"aliases":33,"duplicate_of":9,"upstream":34,"downstream":35,"duplicates":36,"related":37,"reserved_at":9,"published_at":38,"modified_at":39,"state":40,"summary":41,"references_raw":48,"kevs":68,"epss":9,"epss_history":69,"metrics":70,"affected":78},"CVE-2026-32613","Spinnaker is an open source, multi-cloud continuous delivery platform. Echo like some other services, uses SPeL (Spring Expression Language) to process information - specifically around expected artifacts. In versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2, unlike orca, it was NOT restricting that context to a set of trusted classes, but allowing FULL JVM access. This enabled a user to use arbitrary java classes which allow deep access to the system. This enabled the ability to invoke commands, access files, etc. Versions 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2 contain a patch. As a workaround, disable echo entirely.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-94","Improper Control of Generation of Code ('Code Injection')","The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.","weakness","Draft","Base","Medium",[20,24,28],{"id":21,"name":22,"techniques":23},"CAPEC-242","Code Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-35","Leverage Executable Code in Non-Executable Files",[],{"id":29,"name":30,"techniques":31},"CAPEC-77","Manipulating User-Controlled Variables",[],[],[],[],[],[],[],"2026-04-20T20:07:24.697Z","2026-04-20T20:08:54.702Z","Received",{"cisa_kev":42,"cisa_ransomware":42,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":43,"severity_score":44,"severity_version":45,"severity_source":46,"severity_vector":47,"severity_status":40},false,"critical",10,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",[49,55,60,64],{"url":50,"sources":51,"tags":53},"https://github.com/spinnaker/spinnaker/security/advisories/GHSA-69rw-45wj-g4v6",[46,52],"nvd",[54],"X Refsource CONFIRM",{"url":56,"sources":57,"tags":58},"https://github.com/spinnaker/spinnaker/releases/tag/spinnaker-release-2025.3.2",[46,52],[59],"X Refsource MISC",{"url":61,"sources":62,"tags":63},"https://github.com/spinnaker/spinnaker/releases/tag/spinnaker-release-2025.4.2",[46,52],[59],{"url":65,"sources":66,"tags":67},"https://github.com/spinnaker/spinnaker/releases/tag/spinnaker-release-2026.0.1",[46,52],[59],[],[],[71,75],{"source":46,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":72,"cvss_v4_0":9},{"baseScore":44,"baseSeverity":73,"vectorString":47,"impactScore":44,"exploitabilityScore":74},"CRITICAL",7.9,{"source":52,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":76,"cvss_v4_0":9},{"baseScore":77,"baseSeverity":73,"vectorString":47,"impactScore":44,"exploitabilityScore":74},9.9,[79],{"ecosystem":9,"name":80,"vendor":80,"product":80,"cpe_part":81,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":82},"spinnaker","a",[83,88,91,94],{"version":84,"is_range":85,"range_type":46,"version_start":9,"version_start_type":9,"version_end":86,"version_end_type":87,"fixed_in":9},"\u003C 2026.0.1",true,"2026.0.1","excluding",{"version":89,"is_range":85,"range_type":46,"version_start":9,"version_start_type":9,"version_end":90,"version_end_type":87,"fixed_in":9},"\u003C 2025.4.2","2025.4.2",{"version":92,"is_range":85,"range_type":46,"version_start":9,"version_start_type":9,"version_end":93,"version_end_type":87,"fixed_in":9},"\u003C 2025.3.2","2025.3.2",{"version":95,"is_range":85,"range_type":46,"version_start":9,"version_start_type":9,"version_end":96,"version_end_type":87,"fixed_in":9},"\u003C 2026.1.0","2026.1.0"]