9.8
CRITICAL CVSS 3.1
CVE-2022-42889
Apache Commons Text prior to 1.10.0 allows RCE when applied to untrusted input due to insecure interpolation defaults
Description

Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.

INFO

Published Date :

Oct. 13, 2022, 1:15 p.m.

Last Modified :

Nov. 21, 2024, 7:25 a.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2022-42889 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Juniper security_threat_response_manager
2 Juniper jsa1500
3 Juniper jsa3500
4 Juniper jsa3800
5 Juniper jsa5500
6 Juniper jsa5800
7 Juniper jsa7500
8 Juniper jsa7800
1 Apache commons_text
1 Netapp bluexp
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 CRITICAL [email protected]
Solution
Upgrade Apache Commons Text to the latest version to address the variable interpolation vulnerability.
  • Upgrade to Apache Commons Text 1.10.0 or later.
  • Update the affected packages.
Public PoC/Exploit Available at Github

CVE-2022-42889 has a 144 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2022-42889.

URL Resource
http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html
http://seclists.org/fulldisclosure/2023/Feb/3 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/10/13/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/10/18/1 Mailing List Third Party Advisory
https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om Mailing List Vendor Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022 Third Party Advisory
https://security.gentoo.org/glsa/202301-05 Third Party Advisory
https://security.netapp.com/advisory/ntap-20221020-0004/ Third Party Advisory
http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html
http://seclists.org/fulldisclosure/2023/Feb/3 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/10/13/4 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/10/18/1 Mailing List Third Party Advisory
https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om Mailing List Vendor Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022 Third Party Advisory
https://security.gentoo.org/glsa/202301-05 Third Party Advisory
https://security.netapp.com/advisory/ntap-20221020-0004/ Third Party Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2022-42889 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2022-42889 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Java

Updated: 1 day, 5 hours ago
0 stars 0 fork 0 watcher
Born at : March 15, 2026, 6:42 a.m. This repo has been linked 1 different CVEs too.

A comprehensive security test dataset with 4,500 samples covering 31 attack types and 10+ CVE exploits for evaluating AI-powered server defense systems.

Python

Updated: 3 days, 5 hours ago
0 stars 0 fork 0 watcher
Born at : March 13, 2026, 1:59 p.m. This repo has been linked 7 different CVEs too.

None

Updated: 6 days, 11 hours ago
0 stars 0 fork 0 watcher
Born at : March 10, 2026, 10:09 a.m. This repo has been linked 1 different CVEs too.

Docker-based CVE lab environments with PoC exploits. Log4Shell, Spring4Shell, Dirty Pipe, PwnKit, XZ backdoor and more.

ctf cve docker exploit log4shell pentest poc security spring4shell vulnerability

Python Shell Dockerfile PHP C

Updated: 6 days, 9 hours ago
0 stars 0 fork 0 watcher
Born at : March 10, 2026, 8:01 a.m. This repo has been linked 34 different CVEs too.

Scala/SBT dependency risk scanner — vulnerability detection, license compliance, SBOM generation, unused dep analysis, policy-as-code, and more

cli dependency-scanner license-compliance open-source rust sbom sbt scala security vulnerability-scanner

Shell Rust

Updated: 2 days, 22 hours ago
0 stars 0 fork 0 watcher
Born at : March 7, 2026, 2:21 p.m. This repo has been linked 26 different CVEs too.

None

Java

Updated: 1 week, 5 days ago
0 stars 0 fork 0 watcher
Born at : March 4, 2026, 4:33 p.m. This repo has been linked 4 different CVEs too.

None

Java

Updated: 2 weeks ago
0 stars 0 fork 0 watcher
Born at : March 2, 2026, 4:19 a.m. This repo has been linked 5 different CVEs too.

None

Java

Updated: 1 month ago
0 stars 0 fork 0 watcher
Born at : Feb. 11, 2026, 4:08 p.m. This repo has been linked 1 different CVEs too.

SBOM vulnerability enrichment, outdated package detection, and license compliance checking.

Dockerfile Makefile Go

Updated: 1 month, 1 week ago
0 stars 0 fork 0 watcher
Born at : Feb. 9, 2026, 10:37 a.m. This repo has been linked 12 different CVEs too.

None

Shell Java HTML

Updated: 1 month, 1 week ago
0 stars 0 fork 0 watcher
Born at : Feb. 9, 2026, 4:57 a.m. This repo has been linked 9 different CVEs too.

None

Dockerfile Java

Updated: 1 month, 1 week ago
0 stars 0 fork 0 watcher
Born at : Feb. 8, 2026, 4:50 p.m. This repo has been linked 4 different CVEs too.

SBOM generation for KMP gradle builds.

Kotlin

Updated: 1 month, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Jan. 29, 2026, 5:17 a.m. This repo has been linked 1 different CVEs too.

Proof of Concept (PoC) for CVE-2022-42889 (Text4Shell) targeting Apache Commons Text versions prior to 1.10.0. This script automates Remote Code Execution (RCE) via script interpolation to establish a reverse shell. This version is a structured optimization based on the original exploit found at Exploit-DB (ID: 52261).

Python

Updated: 2 months, 1 week ago
0 stars 0 fork 0 watcher
Born at : Jan. 2, 2026, 5:55 a.m. This repo has been linked 1 different CVEs too.

None

Dockerfile Python Java HTML JavaScript TypeScript CSS

Updated: 2 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Dec. 31, 2025, 2:49 p.m. This repo has been linked 16 different CVEs too.

None

Java

Updated: 2 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Dec. 20, 2025, 4:03 p.m. This repo has been linked 5 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2022-42889 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2022-42889 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html
    Added Reference http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html
    Added Reference http://seclists.org/fulldisclosure/2023/Feb/3
    Added Reference http://www.openwall.com/lists/oss-security/2022/10/13/4
    Added Reference http://www.openwall.com/lists/oss-security/2022/10/18/1
    Added Reference https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om
    Added Reference https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022
    Added Reference https://security.gentoo.org/glsa/202301-05
    Added Reference https://security.netapp.com/advisory/ntap-20221020-0004/
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Jan. 19, 2024

    Action Type Old Value New Value
    Added Reference Apache Software Foundation http://packetstormsecurity.com/files/176650/Apache-Commons-Text-1.9-Remote-Code-Execution.html [No types assigned]
  • Reanalysis by [email protected]

    Apr. 17, 2023

    Action Type Old Value New Value
    Changed Reference Type http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html Third Party Advisory http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html Third Party Advisory, VDB Entry
    Changed Reference Type http://seclists.org/fulldisclosure/2023/Feb/3 Third Party Advisory http://seclists.org/fulldisclosure/2023/Feb/3 Mailing List, Third Party Advisory
    Added CPE Configuration AND OR *cpe:2.3:a:juniper:security_threat_response_manager:*:*:*:*:*:*:*:* versions up to (excluding) 7.5.0 *cpe:2.3:a:juniper:security_threat_response_manager:7.5.0:-:*:*:*:*:*:* *cpe:2.3:a:juniper:security_threat_response_manager:7.5.0:up1:*:*:*:*:*:* *cpe:2.3:a:juniper:security_threat_response_manager:7.5.0:up2:*:*:*:*:*:* *cpe:2.3:a:juniper:security_threat_response_manager:7.5.0:up3:*:*:*:*:*:* OR cpe:2.3:h:juniper:jsa1500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:jsa3500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:jsa3800:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:jsa5500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:jsa5800:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:jsa7500:-:*:*:*:*:*:*:* cpe:2.3:h:juniper:jsa7800:-:*:*:*:*:*:*:*
  • Modified Analysis by [email protected]

    Mar. 01, 2023

    Action Type Old Value New Value
    Changed Reference Type http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html No Types Assigned http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html Third Party Advisory
    Changed Reference Type http://seclists.org/fulldisclosure/2023/Feb/3 No Types Assigned http://seclists.org/fulldisclosure/2023/Feb/3 Third Party Advisory
    Changed Reference Type https://security.gentoo.org/glsa/202301-05 No Types Assigned https://security.gentoo.org/glsa/202301-05 Third Party Advisory
  • CVE Modified by [email protected]

    Feb. 15, 2023

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/171003/OX-App-Suite-Cross-Site-Scripting-Server-Side-Request-Forgery.html [No Types Assigned]
  • CVE Modified by [email protected]

    Feb. 15, 2023

    Action Type Old Value New Value
    Added Reference http://seclists.org/fulldisclosure/2023/Feb/3 [No Types Assigned]
  • CVE Modified by [email protected]

    Jan. 11, 2023

    Action Type Old Value New Value
    Added Reference https://security.gentoo.org/glsa/202301-05 [No Types Assigned]
  • Modified Analysis by [email protected]

    Nov. 29, 2022

    Action Type Old Value New Value
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/10/18/1 No Types Assigned http://www.openwall.com/lists/oss-security/2022/10/18/1 Mailing List, Third Party Advisory
    Changed Reference Type https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022 No Types Assigned https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022 Third Party Advisory
    Changed Reference Type https://security.netapp.com/advisory/ntap-20221020-0004/ No Types Assigned https://security.netapp.com/advisory/ntap-20221020-0004/ Third Party Advisory
    Added CPE Configuration OR *cpe:2.3:a:netapp:bluexp:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Oct. 22, 2022

    Action Type Old Value New Value
    Added Reference https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0022 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 20, 2022

    Action Type Old Value New Value
    Added Reference https://security.netapp.com/advisory/ntap-20221020-0004/ [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 18, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/10/18/1 [No Types Assigned]
  • Initial Analysis by [email protected]

    Oct. 17, 2022

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type http://www.openwall.com/lists/oss-security/2022/10/13/4 No Types Assigned http://www.openwall.com/lists/oss-security/2022/10/13/4 Mailing List, Third Party Advisory
    Changed Reference Type https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om No Types Assigned https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om Mailing List, Vendor Advisory
    Added CWE NIST CWE-94
    Added CPE Configuration OR *cpe:2.3:a:apache:commons_text:*:*:*:*:*:*:*:* versions from (including) 1.5 up to (excluding) 1.10.0
  • CVE Modified by [email protected]

    Oct. 13, 2022

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2022/10/13/4 [No Types Assigned]
  • CVE Modified by [email protected]

    Oct. 13, 2022

    Action Type Old Value New Value
    Changed Description Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default. Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.