TopVuln

High-risk vulnerability digests

CVE-2026-6264

  • CRITICAL

Details

CVSS v3
9.8
NVD published
2026-04-14 03:16:09
EPSS
<0.1% probability · 22.7th percentile — 2026-05-12
Affected versions
Talend JobServer, Talend Runtime (unpatched vulnerable versions)
Summary
This critical vulnerability allows unauthenticated remote attackers to execute arbitrary code via the exposed JMX monitoring port of affected Talend products. No prior authentication is required to exploit this flaw, making it easily accessible to remote threat actors. Successful exploitation grants attackers full administrative control over the affected server.
Remediation
Apply the official vendor patch to fully remediate this vulnerability immediately. As a temporary mitigation, require TLS client authentication for the JMX monitoring port, or disable the port entirely if it is not needed. Restrict access to the JMX port from public or untrusted networks.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.