CVE-2026-22244

7.2 HIGH

📋 TL;DR

OpenMetadata versions before 1.11.4 contain a Server-Side Template Injection vulnerability in FreeMarker email templates that allows remote code execution. Attackers with administrative privileges can exploit this to execute arbitrary code on affected systems. This affects all deployments running vulnerable OpenMetadata versions.

💻 Affected Systems

Products:
  • OpenMetadata
Versions: All versions prior to 1.11.4
Operating Systems: All platforms running OpenMetadata
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative privileges to exploit. All deployments with vulnerable versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the OpenMetadata server, potentially leading to data theft, lateral movement, or deployment of persistent backdoors.

🟠

Likely Case

Privileged attacker executes arbitrary commands to steal sensitive metadata, modify configurations, or disrupt service availability.

🟢

If Mitigated

Limited impact due to administrative privilege requirement and proper access controls, potentially only affecting the OpenMetadata application itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative access but is straightforward once authenticated. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.11.4

Vendor Advisory: https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-5f29-2333-h9c7

Restart Required: Yes

Instructions:

1. Backup your OpenMetadata configuration and data. 2. Stop the OpenMetadata service. 3. Upgrade to version 1.11.4 or later. 4. Restart the service. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative accounts to only trusted users and implement strong authentication controls.

Network Segmentation

all

Isolate OpenMetadata servers from sensitive networks and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all administrative activity
  • Deploy network-based intrusion detection systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check OpenMetadata version via web interface or configuration files. Versions below 1.11.4 are vulnerable.

Check Version:

Check OpenMetadata UI or configuration files for version information

Verify Fix Applied:

Confirm version is 1.11.4 or higher and test email template functionality to ensure no unexpected behavior.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative login patterns
  • Suspicious FreeMarker template processing errors
  • Unexpected system command execution

Network Indicators:

  • Unusual outbound connections from OpenMetadata server
  • Suspicious payloads in HTTP requests to template endpoints

SIEM Query:

source="openmetadata" AND (event="template_processing" OR event="admin_login") AND status="error"

🔗 References

📤 Share & Export