CVE-2022-31860

An issue was discovered in OpenRemote through 1.0.4 allows attackers to execute arbitrary code via a crafted Groovy rule.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openremote:openremote:*:*:*:*:*:*:*:*

History

12 Jun 2025, 14:15

Type Values Removed Values Added
CWE CWE-94

21 Nov 2024, 07:05

Type Values Removed Values Added
References () https://github.com/openremote/openremote/ - Product () https://github.com/openremote/openremote/ - Product
References () https://securityblog101.blogspot.com/2022/09/cve-2022-31860.html - Exploit, Third Party Advisory () https://securityblog101.blogspot.com/2022/09/cve-2022-31860.html - Exploit, Third Party Advisory
References () https://stackoverflow.com/questions/159148/groovy-executing-shell-commands - Third Party Advisory () https://stackoverflow.com/questions/159148/groovy-executing-shell-commands - Third Party Advisory
References () https://stackoverflow.com/questions/66069960/groovy-shell-sandboxing-best-practices - Third Party Advisory () https://stackoverflow.com/questions/66069960/groovy-shell-sandboxing-best-practices - Third Party Advisory

Information

Published : 2022-09-06 18:15

Updated : 2025-06-12 14:15


NVD link : CVE-2022-31860

Mitre link : CVE-2022-31860

CVE.ORG link : CVE-2022-31860


JSON object : View

Products Affected

openremote

  • openremote
CWE
NVD-CWE-noinfo CWE-94

Improper Control of Generation of Code ('Code Injection')