CVE-2026-32613
Impact
Echo like some other services, uses SPeL (Spring Expression Language) to process information - specifically around expected artifacts. Unlike orca, it was NOT restricting that context to a set of trusted classes, but allowing FULL JVM access. This enables a user to use arbitrary java classes which allow deep access to the system. This enables the ability to invoke commands, access files, etc.
Workarounds
Disable echo entirely.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/spinnaker/spinnaker/security/advisories/GHSA-69rw-45wj-g4v6, https://nvd.nist.gov/vuln/detail/CVE-2026-32613, https://github.com/spinnaker/spinnaker, https://github.com/spinnaker/spinnaker/releases/tag/spinnaker-release-2025.3.2, https://github.com/spinnaker/spinnaker/releases/tag/spinnaker-release-2025.4.2, https://github.com/spinnaker/spinnaker/releases/tag/spinnaker-release-2026.0.1, https://github.com/spinnaker/spinnaker/releases/tag/spinnaker-release-2026.0.2
