CVE-2025-58059

9.1 CRITICAL

📋 TL;DR

This vulnerability allows authenticated admin users with process-definition creation/modification privileges in Valtimo Business Process Automation platform to execute arbitrary scripts via the Camunda/Operator engine. This can lead to remote code execution, sensitive data extraction, and host environment inspection. Affected systems are Valtimo versions before 12.16.0.RELEASE and from 13.0.0.RELEASE to before 13.1.2.RELEASE.

💻 Affected Systems

Products:
  • Valtimo Business Process Automation Platform
Versions: Versions before 12.16.0.RELEASE and from 13.0.0.RELEASE to before 13.1.2.RELEASE
Operating Systems: All platforms running Valtimo
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin user with process-definition creation/modification privileges and knowledge of Camunda/Operator scripting.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including arbitrary code execution on application host, extraction of all application data and credentials, and lateral movement within the network.

🟠

Likely Case

Unauthorized access to sensitive application data, database credentials, and configuration files leading to data breach.

🟢

If Mitigated

Limited impact due to restricted admin access, network segmentation, and proper access controls limiting attack surface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated admin access and specific knowledge of process engine scripting capabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.16.0.RELEASE or 13.1.2.RELEASE

Vendor Advisory: https://github.com/valtimo-platform/valtimo-backend-libraries/security/advisories/GHSA-w48j-pp7j-fj55

Restart Required: Yes

Instructions:

1. Backup your Valtimo instance and data. 2. Upgrade to version 12.16.0.RELEASE if on version 12.x. 3. Upgrade to version 13.1.2.RELEASE if on version 13.x. 4. Restart the application server. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Disable scripting in ProcessEngineConfiguration

all

Disable scripting capabilities in the Camunda process engine if not required for business processes.

Set processEngineConfiguration.setEnableScriptEngine(false) in your Valtimo configuration

🧯 If You Can't Patch

  • Restrict admin privileges to only trusted personnel and implement least privilege access controls.
  • Implement network segmentation to isolate Valtimo instances from sensitive systems and data.

🔍 How to Verify

Check if Vulnerable:

Check Valtimo version in application properties or via admin interface. Vulnerable if version is <12.16.0.RELEASE or between 13.0.0.RELEASE and <13.1.2.RELEASE.

Check Version:

Check application.properties or use Valtimo admin interface to view version information.

Verify Fix Applied:

Verify version is 12.16.0.RELEASE or higher if on 12.x, or 13.1.2.RELEASE or higher if on 13.x.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process definition modifications
  • Script execution logs from non-standard users
  • Unexpected system command execution

Network Indicators:

  • Unusual outbound connections from Valtimo server
  • Data exfiltration patterns

SIEM Query:

source="valtimo" AND (event="process_definition_modification" OR event="script_execution") AND user_role="admin"

🔗 References

📤 Share & Export