A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Talend ESB Runtime, the vulnerability can be mitigated by disabling the JobServer JMX monitoring port, which is disabled by default from the R2024-07-RT patch.
Metrics
Affected Vendors & Products
References
History
Tue, 14 Apr 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Talend ESB Runtime, the vulnerability can be mitigated by disabling the JobServer JMX monitoring port, which is disabled by default from the R2024-07-RT patch. | |
| Title | Critical Security fix for the Talend JobServer and Talend Runtime | |
| First Time appeared |
Talend
Talend esb Runtime Talend jobserver |
|
| CPEs | cpe:2.3:a:talend:esb_runtime:*:*:*:*:*:*:*:* cpe:2.3:a:talend:jobserver:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Talend
Talend esb Runtime Talend jobserver |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Bugcrowd
Published:
Updated: 2026-04-14T02:03:18.536Z
Reserved: 2026-04-14T01:12:19.962Z
Link: CVE-2026-6264
No data.
Status : Received
Published: 2026-04-14T03:16:09.050
Modified: 2026-04-14T03:16:09.050
Link: CVE-2026-6264
No data.
OpenCVE Enrichment
No data.