Critical Spinnaker Vulnerability Exposes JVM to Attackers
The National Vulnerability Database has detailed CVE-2026-32613, a critical vulnerability in Spinnaker, the open-source, multi-cloud continuous delivery platform. This flaw, rated 9.9 CVSS, specifically impacts Spinnaker’s Echo service, which leverages Spring Expression Language (SPeL) for artifact processing.
Unlike other Spinnaker components, Echo in versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2 failed to restrict SPeL context to trusted classes. This oversight granted attackers full JVM access, enabling arbitrary Java class execution. The National Vulnerability Database confirms this allows for command invocation and file system access, presenting a severe remote code execution risk.
Defenders must prioritize patching. The National Vulnerability Database states that versions 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2 contain the necessary fix. For organizations unable to patch immediately, disabling the Echo service entirely is a viable workaround to mitigate this critical exposure.
What This Means For You
- If your organization uses Spinnaker, immediately verify your Echo service version. Prioritize patching to versions 2026.1.0, 2026.0.1, 2025.4.2, or 2025.3.2 to prevent full JVM access. If patching isn't feasible, disable Echo immediately to close this critical RCE vector.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-32613 - Spinnaker Echo SPeL JVM Access
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-32613 | RCE | Spinnaker Echo service versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2 |
| CVE-2026-32613 | Code Injection | Spinnaker Echo service SPeL (Spring Expression Language) processing with full JVM access |
| CVE-2026-32613 | Information Disclosure | Spinnaker Echo service SPeL (Spring Expression Language) allowing arbitrary file access |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 21, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.