Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

740+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-32613: Spinnaker Echo Spring Expression Language Injection (CVSS 9.9)
CVE-2026-32613: Spinnaker Echo Spring Expression Language Injection (CVSS 9.9)

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-32613

CVE-2026-32613: Spinnaker Echo Spring Expression Language Injection (CVSS 9.9)

A critical code injection flaw in Spinnaker's Echo service allows unrestricted Spring Expression Language (SPeL) execution via artifact processing, enabling full remote code execution on affected deployments.

Dylan H.

Security Team

April 21, 2026
4 min read

Affected Products

  • Spinnaker echo < 2026.1.0, < 2026.0.1, < 2025.4.2, < 2025.3.2

Overview

A critical code injection vulnerability has been discovered in Spinnaker's Echo service, the event and notification component responsible for pipeline triggering and artifact processing. Tracked as CVE-2026-32613 with a CVSS score of 9.9, the flaw stems from unrestricted processing of Spring Expression Language (SPeL) expressions during expected artifact evaluation — an attack surface that was secured in other Spinnaker services (such as Orca) but left unguarded in Echo.

An attacker who can influence artifact input to Echo can inject arbitrary SPeL expressions, which are then evaluated server-side with no sandboxing, enabling full remote code execution on the Echo service pod.

Affected Versions

ComponentVulnerable Versions
Spinnaker echoAll versions prior to 2026.1.0
Spinnaker echoAll versions prior to 2026.0.1
Spinnaker echoAll versions prior to 2025.4.2
Spinnaker echoAll versions prior to 2025.3.2

Vulnerability Details

CVE ID: CVE-2026-32613
CVSS Score: 9.9 (Critical)
Attack Vector: Network
Authentication Required: Low (pipeline/artifact control)
Component: echo (Spinnaker notification and event service)
CWE: CWE-94 (Improper Control of Generation of Code)

Root Cause

Spinnaker uses Spring Expression Language (SPeL) to process dynamic values across several services. SPeL is a powerful expression language that, when unrestricted, allows arbitrary Java method invocation and OS-level operations.

The Orca service (pipeline orchestration) had SPeL restrictions applied in earlier versions, but Echo was never updated with equivalent restrictions. Since Echo processes expected artifact definitions — which can contain SPeL expressions — a crafted artifact definition causes Echo to evaluate attacker-controlled SPeL, resulting in code execution.

How SPeL Injection Works

SPeL expressions use the ${} or #{} syntax to evaluate Java expressions at runtime. Spinnaker pipelines use these expressions legitimately for variable substitution and conditional logic. However, SPeL also provides access to the full Java class ecosystem through its T() operator, which allows callers to reference any Java class — including those with system-level capabilities.

When Echo evaluates artifact name expressions without restricting the available class set, an attacker-supplied expression can invoke Java's runtime environment capabilities directly. This gives the attacker the same level of access as the Echo process itself, which typically runs within the Kubernetes service mesh with access to other Spinnaker components.

Impact

Successful exploitation allows an attacker to:

  • Execute arbitrary commands on the Echo pod
  • Access Spinnaker internal APIs — Echo communicates with Gate, Orca, Front50, and other services
  • Trigger unauthorized pipeline executions — send fabricated events to initiate deployments
  • Exfiltrate notification secrets — Slack tokens, PagerDuty keys, email credentials configured in Echo
  • Move laterally within the Spinnaker service mesh

Timeline

DateEvent
2026-04-20CVE published to NVD
2026-04-21Fixed versions confirmed in Spinnaker release channels

Remediation

Upgrade immediately to a patched version:

  • 2026.1.0 or later
  • 2026.0.1 or later
  • 2025.4.2 or later
  • 2025.3.2 or later

The patches restrict SPeL expression evaluation in Echo to a safe subset, consistent with the restrictions already in place in Orca.

Interim Mitigations

If immediate patching is not possible:

  1. Restrict artifact input sources — limit which systems can submit artifacts to Echo; use authenticated pipeline triggers only
  2. Network-isolate Echo — prevent external or unauthenticated access to Echo's API endpoints
  3. Monitor Echo logs — look for unusual process execution or unexpected outbound connections from the Echo pod
  4. Review notification configurations — audit and rotate all secrets (Slack, PagerDuty, email) configured in Echo

Relationship to CVE-2026-32604

This CVE was disclosed alongside CVE-2026-32604, a separate critical RCE in Spinnaker's clouddriver service. Organizations running Spinnaker should treat both vulnerabilities as part of a coordinated patch cycle — both carry CVSS 9.9 and affect the same release branches.

References

  • NVD Entry — CVE-2026-32613
  • Spinnaker GitHub Repository
  • CosmicBytez Labs — CVE-2026-32604 (Spinnaker Clouddriver RCE)
#CVE#Cloud Security#Spinnaker#Code Injection#RCE#Critical

Related Articles

CVE-2026-32604: Spinnaker Clouddriver Remote Code Execution (CVSS 9.9)

A critical unauthenticated RCE vulnerability in Spinnaker's clouddriver service allows attackers to execute arbitrary commands on clouddriver pods, exposing credentials and cloud infrastructure.

2 min read

CVE-2026-39918: Vvveb CMS Unauthenticated PHP Code Injection via Install Endpoint

Vvveb CMS versions prior to 1.0.8.1 allow unauthenticated attackers to inject arbitrary PHP code through the installation endpoint's unsanitized subdir parameter, enabling full remote code execution.

4 min read

CVE-2026-21994: Critical Unauthenticated RCE in Oracle Edge Cloud Infrastructure Designer v0.3.0

A critical unauthenticated remote code execution vulnerability (CVSS 9.8) in Oracle's Edge Cloud Infrastructure Designer and Visualisation Toolkit allows...

6 min read
Back to all Security Alerts