A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Talend ESB Runtime, the vulnerability can be mitigated by disabling the JobServer JMX monitoring port, which is disabled by default from the R2024-07-RT patch.
History

Tue, 14 Apr 2026 02:45:00 +0000

Type Values Removed Values Added
Description A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Talend ESB Runtime, the vulnerability can be mitigated by disabling the JobServer JMX monitoring port, which is disabled by default from the R2024-07-RT patch.
Title Critical Security fix for the Talend JobServer and Talend Runtime
First Time appeared Talend
Talend esb Runtime
Talend jobserver
CPEs cpe:2.3:a:talend:esb_runtime:*:*:*:*:*:*:*:*
cpe:2.3:a:talend:jobserver:*:*:*:*:*:*:*:*
Vendors & Products Talend
Talend esb Runtime
Talend jobserver
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Bugcrowd

Published:

Updated: 2026-04-14T02:03:18.536Z

Reserved: 2026-04-14T01:12:19.962Z

Link: CVE-2026-6264

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-14T03:16:09.050

Modified: 2026-04-14T03:16:09.050

Link: CVE-2026-6264

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.