A vulnerability exists in Google Apigee's JavaCallout policy https://docs.apigee.com/api-platform/reference/policies/java-callout-policy that allows for remote code execution.
It is possible for a user to write a JavaCallout that injected a malicious object into the MessageContext to execute arbitrary Java code and system commands at runtime, leading to unauthorized access to data, lateral movement within the network, and access to backend systems.
The Apigee hybrid versions below have all been updated to protect from this vulnerability:
* Hybrid_1.11.2+
* Hybrid_1.12.4+
* Hybrid_1.13.3+
* Hybrid_1.14.1+
* OPDK_5202+
* OPDK_5300+
CVSS
No CVSS.
References
Configurations
No configuration.
History
05 Dec 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-05 22:15
Updated : 2025-12-08 18:26
NVD link : CVE-2025-13426
Mitre link : CVE-2025-13426
CVE.ORG link : CVE-2025-13426
JSON object : View
Products Affected
No product.
CWE
CWE-913
Improper Control of Dynamically-Managed Code Resources
