CVE-2026-42555

Ritense · Valtimo

The Valtimo platform is vulnerable to Remote Code Execution (RCE) via insecure Spring Expression Language (SpEL) evaluation in multiple components.

Executive summary

A critical RCE vulnerability in the Ritense Valtimo platform allows an authenticated administrator to execute arbitrary code and exfiltrate credentials.

Vulnerability

The application incorrectly evaluates user-supplied input using Spring Expression Language (SpEL) within a StandardEvaluationContext, granting an authenticated user with the ADMIN role full execution privileges.

Business impact

Successful exploitation grants an attacker full control over the application server, allowing for the exfiltration of sensitive process data and credentials. With a CVSS score of 9.1, this represents a significant threat to the confidentiality and integrity of business process automation environments.

Remediation

Immediate Action: Upgrade the Valtimo Document, Case, and Contract components to versions 12.32.0, 13.23.0, and 13.23.0 respectively.

Proactive Monitoring: Audit server logs for suspicious SpEL-related activity or unauthorized configuration changes performed by administrative accounts.

Compensating Controls: Implement strict network access control lists (ACLs) to limit access to administrative interfaces and use a WAF to inspect input for malicious expression injection.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Organizations utilizing the Valtimo platform must prioritize the recommended component upgrades. Given the potential for total system compromise, immediate remediation is required to secure the administrative environment.