Description:
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Atlas
Apache Atlas exposes a DSL search endpoint that accepts user-supplied query strings. Attacker can alter Gremlin traversal logic within grammar-allowed characters to access unintended data
Affect Version:
This issue affects Apache Atlas: from 0.8 through 2.4.0.
For the affect version >= 2.0, vulnerability is only when Atlas is deployed with below non-default configuration.
atlas.dsl.executor.traversal=false
Mitigation:
Users are recommended to upgrade to version 2.5.0, which fixes the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 04 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache atlas |
|
| Vendors & Products |
Apache
Apache atlas |
Mon, 04 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 04 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 04 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Description: Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Atlas Apache Atlas exposes a DSL search endpoint that accepts user-supplied query strings. Attacker can alter Gremlin traversal logic within grammar-allowed characters to access unintended data Affect Version: This issue affects Apache Atlas: from 0.8 through 2.4.0. For the affect version >= 2.0, vulnerability is only when Atlas is deployed with below non-default configuration. atlas.dsl.executor.traversal=false Mitigation: Users are recommended to upgrade to version 2.5.0, which fixes the issue. | |
| Title | Apache Atlas: Script injection allows access to unintended data | |
| Weaknesses | CWE-94 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-05-04T16:04:26.483Z
Reserved: 2026-04-14T12:05:23.666Z
Link: CVE-2026-40563
Updated: 2026-05-04T15:43:57.213Z
Status : Received
Published: 2026-05-04T16:16:02.283
Modified: 2026-05-04T17:16:23.500
Link: CVE-2026-40563
No data.
OpenCVE Enrichment
Updated: 2026-05-04T19:00:06Z