CVE-2026-8759: xiandafu beetl SpEL Injection Vulnerability
The National Vulnerability Database has disclosed CVE-2026-8759, a high-severity vulnerability (CVSS 7.3) affecting xiandafu beetl up to version 3.20.2. This flaw resides in the SpELFunction.java component, specifically an unknown function within beetl-classic-integration/beetl-spring-classic/. The issue stems from improper neutralization of special elements in an expression language statement, leading to a remote code execution risk.
This isn’t theoretical; the exploit for CVE-2026-8759 is publicly available. Attackers can leverage this vulnerability without authentication or user interaction, making it a critical threat for any organization running affected versions. The National Vulnerability Database notes that the project maintainers were informed but have not yet responded, leaving a window for exploitation.
From an attacker’s perspective, this is a low-effort, high-reward target. The combination of remote exploitation, no prerequisites, and public exploit code means it will be rapidly weaponized. Defenders need to prioritize mitigation immediately. The core problem is an expression language injection (CWE-917) combined with improper input validation (CWE-20), a classic recipe for remote code execution.
What This Means For You
- If your organization utilizes xiandafu beetl, specifically versions up to 3.20.2, you are exposed to unauthenticated remote code execution via CVE-2026-8759. Given the public availability of exploit code, assume active exploitation is imminent. Immediately identify all instances of xiandafu beetl in your environment. If no patch is available, prioritize isolating affected systems or implementing compensating controls to restrict network access to these components.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-8759: Beetl SpEL Injection via SpELFunction.java
title: CVE-2026-8759: Beetl SpEL Injection via SpELFunction.java
id: scw-2026-05-17-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-8759 by targeting the SpELFunction.java component in Beetl. The rule looks for requests containing '/SpELFunction.java' in the URI and a SpEL expression attempting to execute commands via 'T(java.lang.Runtime).getRuntime().exec(' in the query string.
author: SCW Feed Engine (AI-generated)
date: 2026-05-17
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-8759/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/SpELFunction.java'
cs-uri-query|contains:
- 'T(java.lang.Runtime).getRuntime().exec('
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-8759 | Code Injection | xiandafu beetl up to 3.20.2 |
| CVE-2026-8759 | Code Injection | beetl-classic-integration/beetl-spring-classic/src/main/java/org/beetl/ext/spring/SpELFunction.java |
| CVE-2026-8759 | Code Injection | Improper Neutralization of Special Elements in an Expression Language Statement |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 17, 2026 at 18:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.