<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
<title>Camunda — Security Notices</title>
<link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/</link>
<description>Security notices for Camunda 8</description>
<language>en</language>
<lastBuildDate>Wed, 22 Apr 2026 13:51:40 GMT</lastBuildDate>
<ttl>60</ttl>
<docs>http://www.rssboard.org/rss-specification</docs>
<atom:link href="https://unsupported.docs.camunda.io/8.6/rss/security/notices.xml" rel="self" type="application/rss+xml" />
<image>
<url>https://unsupported.docs.camunda.io/8.6/img/black-C.png</url>
<title>Camunda — Security Notices</title>
<link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/</link>
</image>

<item>
  <title>Notice 43</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-43</link>
  <guid isPermaLink="false">camunda-security-notice-43</guid>
  <pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate>
  <description>When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP headers will not be written. This is related to CVE-2026-22732.</description>
  <category>Management Identity</category>
  <category>Camunda Tasklist</category>
  <category>Camunda Zeebe</category>
  <category>Camunda Operate</category>
  <category>Camunda Optimize</category>
  <category>Camunda Web Modeler</category>
  <content:encoded><![CDATA[<p>When applications specify HTTP response headers for servlet applications using Spring Security, there is the possibility that the HTTP headers will not be written. This is related to <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-22732" target="_blank" rel="noopener noreferrer">CVE-2026-22732</a>.</p> <h3 id="how-to-determine-if-the-installation-is-affected">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Management Identity 8.7.4 - 8.7.10, 8.7.12 - 8.7.16, 8.8.0 - 8.8.2, or 8.8.5 - 8.8.9</li> 
<li>Zeebe 8.7.21 - 8.7.25</li> 
<li>Tasklist 8.7.21 - 8.7.25</li> 
<li>Operate 8.7.22 - 8.7.25</li> 
<li>Optimize 8.7.14 - 8.7.18 or 8.8.2 - 8.8.7</li> 
<li>Web Modeler Self-Managed ≤ 8.6.26, ≤ 8.7.18, or ≤ 8.8.11</li> 
</ul> <h3 id="solution">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Management Identity 8.7.17, 8.8.10</li> 
<li>Zeebe 8.7.26</li> 
<li>Tasklist 8.7.26</li> 
<li>Operate 8.7.26</li> 
<li>Optimize 8.7.19, 8.8.8</li> 
<li>Web Modeler Self-Managed 8.6.27, 8.7.19, 8.8.12</li> 
</ul> <p>The fix was deployed to Web Modeler SaaS on March 23, 2026, 17:26 CET.</p> ]]></content:encoded>
</item>
<item>
  <title>Notice 42</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-42</link>
  <guid isPermaLink="false">camunda-security-notice-42</guid>
  <pubDate>Mon, 09 Mar 2026 00:00:00 GMT</pubDate>
  <description>The application was vulnerable to CVE-2026-24734, which allowed an attacker to bypass revocation checks of client SSL certificates if a certain server configuration was used.</description>
  <category>Management Identity</category>
  <content:encoded><![CDATA[<p>The application was vulnerable to <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24734" target="_blank" rel="noopener noreferrer">CVE-2026-24734</a>, which allowed an attacker to bypass revocation checks of client SSL certificates if a certain server configuration was used.</p> <h3 id="how-to-determine-if-the-installation-is-affected-1">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Management Identity ≤ 8.8.7, ≤ 8.7.14, or ≤ 8.6.27</li> 
</ul> <h3 id="solution-1">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Management Identity 8.8.8, 8.7.15, 8.6.28</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 41</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-41</link>
  <guid isPermaLink="false">camunda-security-notice-41</guid>
  <pubDate>Mon, 09 Mar 2026 00:00:00 GMT</pubDate>
  <description>The version of fast-xml-parser used by Camunda Web Modeler was affected by CVE-2026-26278, a vulnerability which could be exploited as a vector for denial of service attacks by forcing the parser to d...</description>
  <category>Camunda Web Modeler</category>
  <content:encoded><![CDATA[<p>The version of <code>fast-xml-parser</code> used by Camunda Web Modeler was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-26278" target="_blank" rel="noopener noreferrer">CVE-2026-26278</a>, a vulnerability which could be exploited as a vector for denial of service attacks by forcing the parser to do an unlimited amount of entity expansions.</p> <h3 id="how-to-determine-if-the-installation-is-affected-2">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Web Modeler Self-Managed ≤ 8.8.8, ≤ 8.7.16, or ≤ 8.6.25</li> 
</ul> <h3 id="solution-2">Solution</h3> <p>Camunda has provided the following releases that contain the fix:</p> <ul>
<li>Web Modeler Self-Managed 8.8.9, 8.7.17, 8.6.26</li> 
</ul> <p>This issue does not affect Web Modeler SaaS.</p> ]]></content:encoded>
</item>
<item>
  <title>Notice 40</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-40</link>
  <guid isPermaLink="false">camunda-security-notice-40</guid>
  <pubDate>Mon, 23 Feb 2026 00:00:00 GMT</pubDate>
  <description>The version of Tomcat used by the Diagram Converter Webapp was affected by:</description>
  <category>C7 to C8 Migration Tooling</category>
  <content:encoded><![CDATA[<p>The version of Tomcat used by the Diagram Converter Webapp was affected by:</p> <ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66614" target="_blank" rel="noopener noreferrer">CVE-2025-66614</a></li> 
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2026-24734" target="_blank" rel="noopener noreferrer">CVE-2026-24734</a></li> 
</ul> <h3 id="how-to-determine-if-the-installation-is-affected-3">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>C7 to C8 Migration Tooling 0.2.0 <strong>AND</strong></li> 
<li>the Diagram Converter Webapp</li> 
</ul> <h3 id="solution-3">Solution</h3> <p>Camunda has released the <strong>C7 to C8 Migration Tooling 0.2.1</strong>, which includes the fix.</p> ]]></content:encoded>
</item>
<item>
  <title>Notice 39</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-39</link>
  <guid isPermaLink="false">camunda-security-notice-39</guid>
  <pubDate>Tue, 10 Feb 2026 00:00:00 GMT</pubDate>
  <description>The version of fast-xml-parser used by Camunda Web Modeler was affected by CVE-2026-25128, a RangeError vulnerability that could crash any application that processes untrusted XML input.</description>
  <category>Camunda Web Modeler</category>
  <content:encoded><![CDATA[<p>The version of <code>fast-xml-parser</code> used by Camunda Web Modeler was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2026-25128" target="_blank" rel="noopener noreferrer">CVE-2026-25128</a>, a RangeError vulnerability that could crash any application that processes untrusted XML input.</p> <h3 id="how-to-determine-if-the-installation-is-affected-4">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Web Modeler Self-Managed ≤ 8.8.6, ≤ 8.7.15, or ≤ 8.6.24</li> 
</ul> <h3 id="solution-4">Solution</h3> <p>Camunda has provided the following releases that contain the fix:</p> <ul>
<li>Web Modeler Self-Managed 8.8.7, 8.7.16, 8.6.25</li> 
</ul> <p>The fix was deployed to Web Modeler SaaS on February 2, 2026, 15:15 CET.</p> ]]></content:encoded>
</item>
<item>
  <title>Notice 38</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-38</link>
  <guid isPermaLink="false">camunda-security-notice-38</guid>
  <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
  <description>The version of qs used by Camunda Web Modeler was affected by CVE-2025-15284, an improper input validation vulnerability that allows HTTP DoS.</description>
  <category>Camunda Web Modeler</category>
  <content:encoded><![CDATA[<p>The version of <code>qs</code> used by Camunda Web Modeler was affected by CVE-2025-15284, an improper input validation vulnerability that allows HTTP DoS.</p> <h3 id="how-to-determine-if-the-installation-is-affected-5">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Web Modeler Self-Managed ≤ 8.8.4, ≤ 8.7.14, or ≤ 8.6.23</li> 
</ul> <h3 id="solution-5">Solution</h3> <p>Camunda has provided the following releases that contain the fix:</p> <ul>
<li>Web Modeler Self-Managed 8.8.5, 8.7.15, 8.6.24</li> 
</ul> <p>The fix was deployed to Web Modeler SaaS on January 7, 2026, 13:45 CET.</p> ]]></content:encoded>
</item>
<item>
  <title>Notice 37</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-37</link>
  <guid isPermaLink="false">camunda-security-notice-37</guid>
  <pubDate>Fri, 12 Dec 2025 00:00:00 GMT</pubDate>
  <description>The application is vulnerable to CVE-2025-12183, which allows remote attackers to cause denial of service and read adjacent memory via untrusted compressed input.</description>
  <category>Camunda Tasklist</category>
  <category>Camunda Zeebe</category>
  <category>Camunda Operate</category>
  <content:encoded><![CDATA[<p>The application is vulnerable to <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12183" target="_blank" rel="noopener noreferrer">CVE-2025-12183</a>, which allows remote attackers to cause denial of service and read adjacent memory via untrusted compressed input.</p> <h3 id="how-to-determine-if-the-installation-is-affected-6">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Tasklist/Zeebe/Operate ≤ 8.8.6, ≤ 8.7.20, or ≤ 8.6.32</li> 
</ul> <h3 id="solution-6">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Tasklist/Zeebe/Operate 8.8.7, 8.7.21, 8.6.33</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 36</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-36</link>
  <guid isPermaLink="false">camunda-security-notice-36</guid>
  <pubDate>Wed, 03 Dec 2025 00:00:00 GMT</pubDate>
  <description>The application is vulnerable to CVE-2025-53066, which allows an unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalV...</description>
  <category>Management Identity</category>
  <content:encoded><![CDATA[<p>The application is vulnerable to <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066" target="_blank" rel="noopener noreferrer">CVE-2025-53066</a>, which allows an unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data.</p> <h3 id="how-to-determine-if-the-installation-is-affected-7">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Management Identity ≤ 8.8.2, ≤ 8.7.10, or ≤ 8.6.22</li> 
</ul> <h3 id="solution-7">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Management Identity 8.8.3, 8.7.11, 8.6.23</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 35</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-35</link>
  <guid isPermaLink="false">camunda-security-notice-35</guid>
  <pubDate>Wed, 26 Nov 2025 00:00:00 GMT</pubDate>
  <description>The embedded JDBC driver for Amazon Aurora PostgreSQL (software.amazon.jdbc:aws-advanced-jdbc-wrapper) was affected by
CVE-2025-12967, which may allow for privilege escalation to the rds_superuser rol...</description>
  <category>Camunda Web Modeler Self-Managed</category>
  <category>Camunda Management Identity</category>
  <content:encoded><![CDATA[<p>The embedded JDBC driver for Amazon Aurora PostgreSQL (<code>software.amazon.jdbc:aws-advanced-jdbc-wrapper</code>) was affected by
<a href="https://nvd.nist.gov/vuln/detail/CVE-2025-12967" target="_blank" rel="noopener noreferrer">CVE-2025-12967</a>, which may allow for privilege escalation to the <code>rds_superuser</code> role.
A low privilege authenticated user can create a crafted function that could be executed with permissions of other Amazon Relational Database Service (RDS) users.</p> <h3 id="how-to-determine-if-the-installation-is-affected-8">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Web Modeler Self-Managed ≤ 8.8.2, ≤ 8.7.12, or ≤ 8.6.21 with Amazon Aurora PostgreSQL</li> 
<li>Management Identity ≤ 8.8.1, ≤ 8.7.9, or ≤ 8.6.21 with Amazon Aurora PostgreSQL</li> 
</ul> <h3 id="solution-8">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Web Modeler Self-Managed 8.8.3, 8.7.13, 8.6.22</li> 
<li>Management Identity 8.8.2, 8.7.10, 8.6.22</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 34</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-34</link>
  <guid isPermaLink="false">camunda-security-notice-34</guid>
  <pubDate>Tue, 11 Nov 2025 00:00:00 GMT</pubDate>
  <description>The version of the MSSQL JDBC driver com.microsoft.sqlserver:mssql-jdbc used by Web Modeler was affected by CVE-2025-59250, which allows improper input validation that could enable an attacker to perf...</description>
  <category>Camunda Web Modeler Self-Managed</category>
  <content:encoded><![CDATA[<p>The version of the MSSQL JDBC driver <code>com.microsoft.sqlserver:mssql-jdbc</code> used by Web Modeler was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-59250" target="_blank" rel="noopener noreferrer">CVE-2025-59250</a>, which allows improper input validation that could enable an attacker to perform spoofing over a network.</p> <h3 id="how-to-determine-if-the-installation-is-affected-9">How to determine if the installation is affected</h3> <p>You are using Web Modeler Self-Managed version &lt;= 8.8.1 and Microsoft SQL Server as database vendor.</p> <h3 id="solution-9">Solution</h3> <p>Camunda has provided the following release which contains the fix:</p> <ul>
<li>Web Modeler Self-Managed 8.8.2</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 33</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-33</link>
  <guid isPermaLink="false">camunda-security-notice-33</guid>
  <pubDate>Wed, 22 Oct 2025 00:00:00 GMT</pubDate>
  <description>A bug in signal broadcast command processing allowed unauthorized users to trigger signal start events or signal intermediate catch events in certain process definitions without the required create or...</description>
  <category>Camunda Orchestration Cluster</category>
  <content:encoded><![CDATA[<p>A bug in signal broadcast command processing allowed unauthorized users to trigger signal start events or signal intermediate catch events in certain process definitions without the required create or update permissions.</p> <p>This did not allow users to access process definitions of other tenants, or leak any information about these process instances back to the unauthorized users.</p> <h3 id="how-to-determine-if-the-installation-is-affected-10">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Orchestration Cluster 8.8.0</li> 
</ul> <h3 id="solution-10">Solution</h3> <p>Camunda has provided the following release which contains the fix:</p> <ul>
<li>Orchestration Cluster 8.8.1</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 32</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-32</link>
  <guid isPermaLink="false">camunda-security-notice-32</guid>
  <pubDate>Tue, 21 Oct 2025 00:00:00 GMT</pubDate>
  <description>The embedded Apache Tomcat was affected by CVE-2025-48989 which made Tomcat vulnerable to the MadeYouReset attack.</description>
  <category>Camunda Identity</category>
  <content:encoded><![CDATA[<p>The embedded Apache Tomcat was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48989" target="_blank" rel="noopener noreferrer">CVE-2025-48989</a> which made Tomcat vulnerable to the MadeYouReset attack.</p> <h3 id="how-to-determine-if-the-installation-is-affected-11">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Identity 8.7.0 - 8.7.4 or 8.7.6 - 8.7.7</li> 
</ul> <h3 id="solution-11">Solution</h3> <p>Camunda has provided the following release which contains the fix:</p> <ul>
<li>Identity 8.7.8</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 31</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-31</link>
  <guid isPermaLink="false">camunda-security-notice-31</guid>
  <pubDate>Thu, 16 Oct 2025 00:00:00 GMT</pubDate>
  <description>The embedded Undertow web server was affected by CVE-2025-9784,
a flaw where malformed client requests can trigger server-side stream resets without incrementing abuse counters.</description>
  <category>Camunda Web Modeler</category>
  <content:encoded><![CDATA[<p>The embedded Undertow web server was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-9784" target="_blank" rel="noopener noreferrer">CVE-2025-9784</a>,
a flaw where malformed client requests can trigger server-side stream resets without incrementing abuse counters.</p> <p>This issue, referred to as the "MadeYouReset" attack, allows malicious clients to induce excessive server workload by
repeatedly causing server-side stream aborts and could be exploited to cause a denial of service (DoS).</p> <h3 id="how-to-determine-if-the-installation-is-affected-12">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Web Modeler Self-Managed 8.8.0, ≤ 8.7.10, or ≤ 8.6.19</li> 
</ul> <h3 id="solution-12">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Web Modeler Self-Managed 8.8.1, 8.7.11, 8.6.20</li> 
</ul> <p>The fix was deployed to Web Modeler SaaS on October 14, 2025, 14:26 CET.</p> ]]></content:encoded>
</item>
<item>
  <title>Notice 30</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-30</link>
  <guid isPermaLink="false">camunda-security-notice-30</guid>
  <pubDate>Tue, 07 Oct 2025 00:00:00 GMT</pubDate>
  <description>The embedded Netty was affected by CVE-2025-58056, an HTTP request
smuggling vulnerability in Netty. Incorrect parsing of chunked transfer encoding could allow attackers to craft
malicious requests th...</description>
  <category>Camunda Tasklist</category>
  <category>Camunda Zeebe</category>
  <category>Camunda Operate</category>
  <category>Camunda Optimize</category>
  <category>Camunda Identity</category>
  <content:encoded><![CDATA[<p>The embedded Netty was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-58056" target="_blank" rel="noopener noreferrer">CVE-2025-58056</a>, an HTTP request
smuggling vulnerability in Netty. Incorrect parsing of chunked transfer encoding could allow attackers to craft
malicious requests that are interpreted inconsistently by proxies and Netty.</p> <h3 id="how-to-determine-if-the-installation-is-affected-13">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Tasklist 8.7.0 - 8.7.12 or 8.5.0 - 8.5.22</li> 
<li>Zeebe 8.7.0 - 8.7.12 or 8.5.0 - 8.5.24</li> 
<li>Operate 8.7.0 - 8.7.12 or 8.5.0 - 8.5.20</li> 
<li>Optimize 8.7.0 - 8.7.9 or 8.6.0 - 8.6.16</li> 
<li>Identity 8.7.0 - 8.7.6 or 8.6.0 - 8.6.19 or 8.5.0 - 8.5.21</li> 
</ul> <h3 id="solution-13">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Tasklist 8.7.13, 8.5.23</li> 
<li>Zeebe 8.7.13, 8.5.25</li> 
<li>Operate 8.7.13, 8.5.21</li> 
<li>Optimize 8.7.10, 8.6.17</li> 
<li>Identity 8.7.7, 8.6.20, 8.5.22</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 29</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-29</link>
  <guid isPermaLink="false">camunda-security-notice-29</guid>
  <pubDate>Fri, 03 Oct 2025 00:00:00 GMT</pubDate>
  <description>Zeebe may be affected by CVE-2024-41996, which allows remote attackers to trigger expensive server-side DHE modular-exponentiation calculations, potentially causing asymmetric resource consumption and...</description>
  <category>Camunda Zeebe</category>
  <content:encoded><![CDATA[<p>Zeebe may be affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-41996" target="_blank" rel="noopener noreferrer">CVE-2024-41996</a>, which allows remote attackers to trigger expensive server-side DHE modular-exponentiation calculations, potentially causing asymmetric resource consumption and DoS attacks.</p> <h3 id="how-to-determine-if-the-installation-is-affected-14">How to determine if the installation is affected</h3> <p>You are potentially affected if you have configured Zeebe to accept DHE or ECDHE cipher suites through the <code>server.ssl.ciphers</code> property or <code>SERVER_SSL_CIPHERS</code> environment variable.</p> <p>Default Zeebe installations are not affected.</p> <h3 id="solution-14">Solution</h3> <p>Configure the <code>server.ssl.ciphers</code> property or <code>SERVER_SSL_CIPHERS</code> environment variable to exclude DHE and ECDHE cipher suites. For example:</p> <div><div><pre tabindex="0"><code><span><span>server.ssl.ciphers=TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA</span><br></span></code></pre></div> </div> <p>There is no known mitigation other than disabling the use of DHE and ECDHE cipher suites.</p> ]]></content:encoded>
</item>
<item>
  <title>Notice 28</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-28</link>
  <guid isPermaLink="false">camunda-security-notice-28</guid>
  <pubDate>Tue, 09 Sep 2025 00:00:00 GMT</pubDate>
  <description>Optimize was affected by CVE-2025-5115, which allows a remote attacker to repeatedly send malformed HTTP/2 frames that exhaust a Jetty server’s CPU and memory, causing a denial-of-service.</description>
  <category>Camunda Optimize</category>
  <content:encoded><![CDATA[<p>Optimize was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-5115" target="_blank" rel="noopener noreferrer">CVE-2025-5115</a>, which allows a remote attacker to repeatedly send malformed HTTP/2 frames that exhaust a Jetty server’s CPU and memory, causing a denial-of-service.</p> <h3 id="how-to-determine-if-the-installation-is-affected-15">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Optimize 8.7.0 - 8.7.8 or 8.6.0 - 8.6.15</li> 
</ul> <h3 id="solution-15">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Optimize 8.7.9, 8.6.16</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 27</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-27</link>
  <guid isPermaLink="false">camunda-security-notice-27</guid>
  <pubDate>Wed, 27 Aug 2025 00:00:00 GMT</pubDate>
  <description>Optimize&apos;s email functionality was affected by CVE-2025-7962, which allowed for SMTP injection by providing forged email recipient addresses that could lead to malicious content being sent to arbitrar...</description>
  <category>Camunda Optimize</category>
  <content:encoded><![CDATA[<p>Optimize's email functionality was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-7962" target="_blank" rel="noopener noreferrer">CVE-2025-7962</a>, which allowed for SMTP injection by providing forged email recipient addresses that could lead to malicious content being sent to arbitrary recipients.</p> <h3 id="how-to-determine-if-the-installation-is-affected-16">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Optimize 8.7.0 - 8.7.7 or 8.6.0 - 8.6.14</li> 
</ul> <h3 id="solution-16">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Optimize 8.7.8, 8.6.15</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 26</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-26</link>
  <guid isPermaLink="false">camunda-security-notice-26</guid>
  <pubDate>Wed, 27 Aug 2025 00:00:00 GMT</pubDate>
  <description>Optimize was affected by CVE-2025-53864 which allows a remote attacker to cause a denial of service via a deeply nested JSON object supplied in a JWT claim set, because of uncontrolled recursion.</description>
  <category>Camunda Optimize</category>
  <content:encoded><![CDATA[<p>Optimize was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53864" target="_blank" rel="noopener noreferrer">CVE-2025-53864</a> which allows a remote attacker to cause a denial of service via a deeply nested JSON object supplied in a JWT claim set, because of uncontrolled recursion.</p> <h3 id="how-to-determine-if-the-installation-is-affected-17">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Optimize 8.7.0 - 8.7.7 or 8.6.0 - 8.6.14</li> 
</ul> <h3 id="solution-17">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Optimize 8.7.8, 8.6.15</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 25</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-25</link>
  <guid isPermaLink="false">camunda-security-notice-25</guid>
  <pubDate>Wed, 27 Aug 2025 00:00:00 GMT</pubDate>
  <description>The embedded Apache Tomcat was affected by CVE-2025-48989 which made Tomcat vulnerable to the MadeYouReset attack.</description>
  <category>Camunda Tasklist</category>
  <category>Camunda Zeebe</category>
  <category>Camunda Operate</category>
  <category>Camunda Optimize</category>
  <content:encoded><![CDATA[<p>The embedded Apache Tomcat was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-48989" target="_blank" rel="noopener noreferrer">CVE-2025-48989</a> which made Tomcat vulnerable to the MadeYouReset attack.</p> <h3 id="how-to-determine-if-the-installation-is-affected-18">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Tasklist 8.7.0 - 8.7.10 or 8.6.0 - 8.6.24 or 8.5.0 - 8.5.20</li> 
<li>Zeebe 8.7.0 - 8.7.10 or 8.6.0 - 8.6.24</li> 
<li>Operate 8.7.0 - 8.7.10 or 8.6.0 - 8.6.24 or 8.5.0 - 8.5.18</li> 
<li>Optimize 8.7.0 - 8.7.7 or 8.6.0 - 8.6.14</li> 
</ul> <h3 id="solution-18">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Tasklist 8.7.11, 8.6.25, 8.5.21</li> 
<li>Zeebe 8.7.11, 8.6.25</li> 
<li>Operate 8.7.11, 8.6.25, 8.5.19</li> 
<li>Optimize 8.7.8, 8.6.15</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 24</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-24</link>
  <guid isPermaLink="false">camunda-security-notice-24</guid>
  <pubDate>Wed, 27 Aug 2025 00:00:00 GMT</pubDate>
  <description>The embedded Netty was affected by CVE-2025-55163 which allows malformed HTTP/2 control frames usage that results in resource exhaustion and distributed denial of service.</description>
  <category>Camunda Tasklist</category>
  <category>Camunda Zeebe</category>
  <category>Camunda Operate</category>
  <category>Camunda Identity</category>
  <category>Camunda Optimize</category>
  <content:encoded><![CDATA[<p>The embedded Netty was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-55163" target="_blank" rel="noopener noreferrer">CVE-2025-55163</a> which allows malformed HTTP/2 control frames usage that results in resource exhaustion and distributed denial of service.</p> <h3 id="how-to-determine-if-the-installation-is-affected-19">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Tasklist 8.7.0 - 8.7.10 or 8.6.0 - 8.6.24 or 8.5.0 - 8.5.20</li> 
<li>Zeebe 8.7.0 - 8.7.10 or 8.6.0 - 8.6.24 or 8.5.0 - 8.5.22</li> 
<li>Operate 8.7.0 - 8.7.10 or 8.6.0 - 8.6.24 or 8.5.0 - 8.5.18</li> 
<li>Identity 8.7.0 - 8.7.5 or 8.6.0 - 8.6.18 or 8.5.0 - 8.5.19</li> 
<li>Optimize 8.7.0 - 8.7.7 or 8.6.0 - 8.6.14</li> 
</ul> <h3 id="solution-19">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Tasklist 8.7.11, 8.6.25, 8.5.21</li> 
<li>Zeebe 8.7.11, 8.6.25, 8.5.23</li> 
<li>Operate 8.7.11, 8.6.25, 8.5.19</li> 
<li>Identity 8.7.6, 8.6.19, 8.5.20</li> 
<li>Optimize 8.7.8, 8.6.15</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 23</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-23</link>
  <guid isPermaLink="false">camunda-security-notice-23</guid>
  <pubDate>Thu, 31 Jul 2025 00:00:00 GMT</pubDate>
  <description>The embedded Spring Boot Tomcat was affected by CVE-2025-53506 which allowed for uncontrolled resource consumption that could be used to exhaust system resources in a potential DoS (denial of service)...</description>
  <category>Camunda Tasklist</category>
  <category>Camunda Zeebe</category>
  <category>Camunda Operate</category>
  <category>Camunda Identity</category>
  <category>Camunda Optimize</category>
  <content:encoded><![CDATA[<p>The embedded Spring Boot Tomcat was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-53506" target="_blank" rel="noopener noreferrer">CVE-2025-53506</a> which allowed for uncontrolled resource consumption that could be used to exhaust system resources in a potential DoS (denial of service) attack.</p> <h3 id="how-to-determine-if-the-installation-is-affected-20">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Tasklist 8.7.0 - 8.7.8 or 8.6.0 - 8.6.22 or 8.5.0 - 8.5.18</li> 
<li>Zeebe 8.7.0 - 8.7.8 or 8.6.0 - 8.6.22</li> 
<li>Operate 8.7.0 - 8.7.8 or 8.6.0 - 8.6.22 or 8.5.0 - 8.5.16</li> 
<li>Identity 8.7.0 - 8.7.4 or 8.6.0 - 8.6.17 or 8.5.0 - 8.5.18</li> 
<li>Optimize 8.7.0 - 8.7.6 or 8.6.0 - 8.6.12</li> 
</ul> <h3 id="solution-20">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Tasklist 8.7.9, 8.6.23, 8.5.19</li> 
<li>Zeebe 8.7.9, 8.6.23</li> 
<li>Operate 8.7.9, 8.6.23, 8.5.17</li> 
<li>Identity 8.7.5, 8.6.18, 8.5.19</li> 
<li>Optimize 8.7.7, 8.6.13</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 22</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-22</link>
  <guid isPermaLink="false">camunda-security-notice-22</guid>
  <pubDate>Thu, 31 Jul 2025 00:00:00 GMT</pubDate>
  <description>Part of our RESTful API that supported multipart file uploads was affected by CVE-2025-52520, which could lead to potential DoS (denial of service) attacks.</description>
  <category>Camunda Tasklist</category>
  <category>Camunda Zeebe</category>
  <category>Camunda Operate</category>
  <content:encoded><![CDATA[<p>Part of our RESTful API that supported multipart file uploads was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-52520" target="_blank" rel="noopener noreferrer">CVE-2025-52520</a>, which could lead to potential DoS (denial of service) attacks.</p> <h3 id="how-to-determine-if-the-installation-is-affected-21">How to determine if the installation is affected</h3> <p>You are using:</p> <ul>
<li>Tasklist 8.6.0 - 8.6.22 or 8.7.0 - 8.7.8</li> 
<li>Zeebe 8.6.0 - 8.6.22 or 8.7.0 - 8.7.8</li> 
<li>Operate 8.6.0 - 8.6.22 or 8.7.0 - 8.7.8</li> 
</ul> <h3 id="solution-21">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Tasklist 8.6.22</li> 
<li>Tasklist 8.7.9</li> 
<li>Zeebe 8.6.23</li> 
<li>Zeebe 8.7.9</li> 
<li>Operate 8.6.23</li> 
<li>Operate 8.7.9</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 21</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-21</link>
  <guid isPermaLink="false">camunda-security-notice-21</guid>
  <pubDate>Wed, 18 Jun 2025 00:00:00 GMT</pubDate>
  <description>The version of org.postgresql:postgresql used by Camunda Web Modeler Self-Managed was affected by CVE-2025-49146 potentially allowing a man-in-the-middle attacker to intercept connections when the Pos...</description>
  <category>Camunda Web Modeler Self-Managed</category>
  <content:encoded><![CDATA[<p>The version of <code>org.postgresql:postgresql</code> used by Camunda Web Modeler Self-Managed was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-49146" target="_blank" rel="noopener noreferrer">CVE-2025-49146</a> potentially allowing a man-in-the-middle attacker to intercept connections when the PostgreSQL JDBC driver was configured with channel binding set to required.</p> <h3 id="how-to-determine-if-the-installation-is-affected-22">How to determine if the installation is affected</h3> <p>You are using Camunda Web Modeler Self-Managed version 8.6.0 - 8.6.12, or 8.7.0 - 8.7.3.</p> <h3 id="solution-22">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Camunda Web Modeler Self-Managed 8.6.12</li> 
<li>Camunda Web Modeler Self-Managed 8.7.3</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 20</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-20</link>
  <guid isPermaLink="false">camunda-security-notice-20</guid>
  <pubDate>Tue, 17 Jun 2025 00:00:00 GMT</pubDate>
  <description>Camunda Optimize was affected by a vulnerability that allowed an attacker to gain improper access to Optimize data by using a modified JWT (JSON Web Token).</description>
  <category>Camunda Optimize</category>
  <content:encoded><![CDATA[<p>Camunda Optimize was affected by a vulnerability that allowed an attacker to gain improper access to Optimize data by using a modified JWT (JSON Web Token).</p> <h3 id="how-to-determine-if-the-installation-is-affected-23">How to determine if the installation is affected</h3> <p>You are using Camunda Optimize ≤ 8.6.9 or ≤ 8.7.2.</p> <h3 id="solution-23">Solution</h3> <p>Camunda has provided the following release which contains a fix:</p> <ul>
<li><a href="https://github.com/camunda/camunda/releases/tag/8.6.10-optimize" target="_blank" rel="noopener noreferrer">Camunda Optimize 8.6.10</a></li> 
<li><a href="https://github.com/camunda/camunda/releases/tag/8.7.3-optimize" target="_blank" rel="noopener noreferrer">Camunda Optimize 8.7.3</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 19</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-19</link>
  <guid isPermaLink="false">camunda-security-notice-19</guid>
  <pubDate>Wed, 21 May 2025 00:00:00 GMT</pubDate>
  <description>The version of nodejs used by Camunda Web Modeler was affected by CVE-2025-23166 potentially allowing an adversary to remotely crash the Node.js runtime.</description>
  <category>Camunda Web Modeler</category>
  <content:encoded><![CDATA[<p>The version of <code>nodejs</code> used by Camunda Web Modeler was affected by <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-23166" target="_blank" rel="noopener noreferrer">CVE-2025-23166</a> potentially allowing an adversary to remotely crash the Node.js runtime.</p> <h3 id="how-to-determine-if-the-installation-is-affected-24">How to determine if the installation is affected</h3> <p>You are using Camunda Web Modeler Self-Managed version ≤ 8.4.17, ≤ 8.5.18, ≤ 8.6.10, or ≤ 8.7.1.</p> <h3 id="solution-24">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Camunda Web Modeler Self-Managed 8.4.18</li> 
<li>Camunda Web Modeler Self-Managed 8.5.19</li> 
<li>Camunda Web Modeler Self-Managed 8.6.11</li> 
<li>Camunda Web Modeler Self-Managed 8.7.2</li> 
</ul> <p>The fix was deployed to Web Modeler SaaS on May 19, 2025, 15:10 CET.</p> ]]></content:encoded>
</item>
<item>
  <title>Notice 18</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-18</link>
  <guid isPermaLink="false">camunda-security-notice-18</guid>
  <pubDate>Tue, 08 Apr 2025 00:00:00 GMT</pubDate>
  <description>Camunda Optimize was affected by a vulnerability that allowed an attacker to modify a JWT (JSON Web Token) so that they would be given improper access to Optimize.</description>
  <category>Camunda Optimize</category>
  <content:encoded><![CDATA[<p>Camunda Optimize was affected by a vulnerability that allowed an attacker to modify a JWT (JSON Web Token) so that they would be given improper access to Optimize.</p> <h3 id="how-to-determine-if-the-installation-is-affected-25">How to determine if the installation is affected</h3> <p>You are using Camunda Optimize ≤ 8.4.15, ≤ 8.5.12, ≤ 8.6.6, ≤ 8.7.0, ≤ 3.11.20, ≤ 3.12.15, ≤ 3.13.12, ≤ 3.14.3, ≤ 3.15.1.</p> <h3 id="solution-25">Solution</h3> <p>Camunda has provided the following release which contains a fix:</p> <ul>
<li>Camunda Optimize 8.4.16, 8.5.13, 8.6.7, 8.7.0, 3.12.16, 3.13.13, 3.14.4, 3.15.2</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 17</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-17</link>
  <guid isPermaLink="false">camunda-security-notice-17</guid>
  <pubDate>Tue, 08 Apr 2025 00:00:00 GMT</pubDate>
  <description>When parsing unknown fields in the Protobuf Java Lite and Full library, a maliciously crafted message can cause a StackOverflow error and lead to a
program crash.</description>
  <category>Camunda Zeebe</category>
  <content:encoded><![CDATA[<p>When parsing unknown fields in the Protobuf Java Lite and Full library, a maliciously crafted message can cause a StackOverflow error and lead to a
program crash.</p> <ul>
<li>As Zeebe makes extensive use of Protobuf, this could lead to denial-of-service (DoS) issues on the server side.</li> 
<li>This issue allows an attacker to send specific payloads that will always result in <code>StackOverflowException</code>. This could lead to gateway performance issues and affect system availability.</li> 
<li>Although the gateway will not crash, it will spend more time working on these requests. An attacker could use this opportunity to slow it down and make it unusable by sending a large number of requests within a short time frame.</li> 
</ul> <p>No data is leaked, lost, or corrupted. This issue only affects application availability.</p> <p><a href="https://github.com/advisories/GHSA-735f-pc8j-v9w8" target="_blank" rel="noopener noreferrer">Learn more about this CVE at the GitHub Advisory Database</a>.</p> <h3 id="how-to-determine-if-the-installation-is-affected-26">How to determine if the installation is affected</h3> <p>You are using Camunda Zeebe 8.6.11.</p> <h3 id="solution-26">Solution</h3> <p>Camunda has provided the following release which contains a fix:</p> <ul>
<li><a href="https://github.com/camunda/camunda/releases/tag/8.6.13" target="_blank" rel="noopener noreferrer">Camunda Zeebe 8.6.13</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 16</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-16</link>
  <guid isPermaLink="false">camunda-security-notice-16</guid>
  <pubDate>Fri, 14 Mar 2025 00:00:00 GMT</pubDate>
  <description>Some Camunda Zeebe versions were affected by a vulnerability that allowed a malicious attacker to craft network packets that could crash the gateway.</description>
  <category>Camunda Zeebe</category>
  <content:encoded><![CDATA[<p>Some Camunda Zeebe versions were affected by a vulnerability that allowed a malicious attacker to craft network packets that could crash the gateway.</p> <h3 id="how-to-determine-if-the-installation-is-affected-27">How to determine if the installation is affected</h3> <p>You are using Camunda Zeebe 8.6.0 - 8.6.11</p> <h3 id="solution-27">Solution</h3> <p>Camunda has provided the following release which contains a fix:</p> <ul>
<li><a href="https://github.com/camunda/camunda/releases/tag/8.6.12" target="_blank" rel="noopener noreferrer">Camunda Zeebe 8.6.12</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 15</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-15</link>
  <guid isPermaLink="false">camunda-security-notice-15</guid>
  <pubDate>Tue, 11 Mar 2025 00:00:00 GMT</pubDate>
  <description>Some Camunda Optimize versions were affected by a vulnerability that allowed a malicious attacker to craft Camunda URLs that could execute JavaScript code.</description>
  <category>Camunda Optimize</category>
  <content:encoded><![CDATA[<p>Some Camunda Optimize versions were affected by a vulnerability that allowed a malicious attacker to craft Camunda URLs that could execute JavaScript code.</p> <h3 id="how-to-determine-if-the-installation-is-affected-28">How to determine if the installation is affected</h3> <p>You are using Camunda Optimize ≤ 8.6.5.</p> <h3 id="solution-28">Solution</h3> <p>Camunda has provided the following release which contains a fix:</p> <ul>
<li><a href="https://github.com/camunda/camunda/releases/tag/8.6.6-optimize" target="_blank" rel="noopener noreferrer">Camunda Optimize 8.6.6</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 14</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-14</link>
  <guid isPermaLink="false">camunda-security-notice-14</guid>
  <pubDate>Tue, 11 Mar 2025 00:00:00 GMT</pubDate>
  <description>The version of koa used by Camunda Web Modeler was affected by the following vulnerability:</description>
  <category>Camunda Web Modeler</category>
  <content:encoded><![CDATA[<p>The version of <code>koa</code> used by Camunda Web Modeler was affected by the following vulnerability:</p> <ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2025-25200" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2025-25200</a></li> 
</ul> <h3 id="how-to-determine-if-the-installation-is-affected-29">How to determine if the installation is affected</h3> <p>You are using Camunda Web Modeler Self-Managed version ≤ 8.3.16, ≤ 8.4.14, ≤ 8.5.15, or ≤ 8.6.7.</p> <h3 id="solution-29">Solution</h3> <p>Camunda has provided the following releases which contain the fix:</p> <ul>
<li>Camunda Web Modeler Self-Managed 8.3.17</li> 
<li>Camunda Web Modeler Self-Managed 8.4.15</li> 
<li>Camunda Web Modeler Self-Managed 8.5.16</li> 
<li>Camunda Web Modeler Self-Managed 8.6.8</li> 
</ul> <p>The fix was deployed to Web Modeler SaaS on February 14, 2025, 08:50 CET.</p> ]]></content:encoded>
</item>
<item>
  <title>Notice 13</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-13</link>
  <guid isPermaLink="false">camunda-security-notice-13</guid>
  <pubDate>Thu, 18 Jul 2024 00:00:00 GMT</pubDate>
  <description>The version of Apache Tomcat used by Camunda Identity was affected by the following vulnerability:</description>
  <category>Camunda Identity</category>
  <content:encoded><![CDATA[<p>The version of <code>Apache Tomcat</code> used by Camunda Identity was affected by the following vulnerability:</p> <ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-34750" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2024-34750</a></li> 
</ul> <h3 id="how-to-determine-if-the-installation-is-affected-30">How to determine if the installation is affected</h3> <p>You are using Camunda Identity version 8.5.3 or previous.</p> <h3 id="solution-30">Solution</h3> <p>Camunda has provided the following release which contains a fix:</p> <ul>
<li>Camunda Identity 8.5.4</li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 12</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-12</link>
  <guid isPermaLink="false">camunda-security-notice-12</guid>
  <pubDate>Tue, 03 Oct 2023 00:00:00 GMT</pubDate>
  <description>The version of libwebp shipped with Camunda Desktop Modeler was affected by the following vulnerability:</description>
  <category>Camunda Desktop Modeler</category>
  <content:encoded><![CDATA[<p>The version of <code>libwebp</code> shipped with Camunda Desktop Modeler was affected by the following vulnerability:</p> <ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-4863" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2023-4863</a></li> 
</ul> <h3 id="how-to-determine-if-the-installation-is-affected-31">How to determine if the installation is affected</h3> <p>You are using Camunda Desktop Modeler version 5.15.1 or previous.</p> <h3 id="solution-31">Solution</h3> <p>Camunda has provided the following release which contains a fix:</p> <ul>
<li><a href="https://downloads.camunda.cloud/release/camunda-modeler/5.15.2/" target="_blank" rel="noopener noreferrer">Camunda Desktop Modeler 5.15.2</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 11</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-11</link>
  <guid isPermaLink="false">camunda-security-notice-11</guid>
  <pubDate>Mon, 17 Apr 2023 00:00:00 GMT</pubDate>
  <description>The Tasklist REST API functionality of Tasklist 8.2.0 and 8.2.1 allows unauthenticated access to the following methods/URLs:</description>
  <category>Tasklist</category>
  <content:encoded><![CDATA[<p>The Tasklist REST API functionality of Tasklist 8.2.0 and 8.2.1 allows unauthenticated access to the following methods/URLs:</p> <ul>
<li>GET /v1/tasks/{taskId}</li> 
<li>POST /v1/tasks/search</li> 
<li>POST /v1/tasks/{taskId}/variables/search</li> 
<li>POST /v1/forms/{formId}</li> 
<li>POST /v1/variables/{variableId}</li> 
</ul> <p>Find more information about the methods in our <a href="https://unsupported.docs.camunda.io/8.6/docs/apis-tools/tasklist-api-rest/tasklist-api-rest-overview/">Tasklist REST API documentation</a>.</p> <p>Therefore, if you use Tasklist 8.2.0 or 8.2.1, and if you have sensible data stored in process variables (accessed by user tasks), this data could have been accessed by users knowing the endpoint of the Tasklist instance without authentication.</p> <h3 id="how-to-determine-if-the-installation-is-affected-32">How to determine if the installation is affected</h3> <p>You are using Tasklist version 8.2.0 or 8.2.1.</p> <h3 id="solution-32">Solution</h3> <p>Camunda has provided the following releases which contain a fix</p> <ul>
<li><a href="https://github.com/camunda/camunda-platform/releases/tag/8.2.2" target="_blank" rel="noopener noreferrer">Tasklist 8.2.2</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 10</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-10</link>
  <guid isPermaLink="false">camunda-security-notice-10</guid>
  <pubDate>Thu, 10 Nov 2022 00:00:00 GMT</pubDate>
  <description>The Tasklist Docker image contain an OpenSSL version 3.0.2 for which the following CVEs have been published:</description>
  <category>Tasklist</category>
  <content:encoded><![CDATA[<p>The Tasklist Docker image contain an OpenSSL version 3.0.2 for which the following CVEs have been published:</p> <ul>
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3602" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2022-3602</a></li> 
<li><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-3786" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2022-3786</a></li> 
</ul> <p>At this point, Camunda is not aware of any specific attack vector in Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.</p> <h3 id="how-to-determine-if-the-installation-is-affected-33">How to determine if the installation is affected</h3> <p>You are Tasklist version (8.0.3 ≥ version ≤ 8.0.7) or ≤ 8.1.2</p> <h3 id="solution-33">Solution</h3> <p>Camunda has provided the following releases which contain a fix</p> <ul>
<li><a href="https://github.com/camunda/camunda-platform/releases/tag/8.1.3" target="_blank" rel="noopener noreferrer">Tasklist 8.1.3</a></li> 
<li><a href="https://github.com/camunda/camunda-platform/releases/tag/8.0.8" target="_blank" rel="noopener noreferrer">Tasklist 8.0.8</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 9</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-9</link>
  <guid isPermaLink="false">camunda-security-notice-9</guid>
  <pubDate>Mon, 11 Apr 2022 00:00:00 GMT</pubDate>
  <description>Zeebe, Operate, Tasklist and IAM are using the Spring framework for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2022-22965</description>
  <category>Zeebe, Operate, Tasklist, IAM</category>
  <content:encoded><![CDATA[<p>Zeebe, Operate, Tasklist and IAM are using the Spring framework for which the following CVE has been published: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22965" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2022-22965</a></p> <p>At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate, Tasklist or IAM allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.</p> <h3 id="how-to-determine-if-the-installation-is-affected-34">How to determine if the installation is affected</h3> <p>You are using Zeebe, Operate or Tasklist version ≤ 1.2.11 or ≤ 1.3.6</p> <h3 id="solution-34">Solution</h3> <p>Camunda has provided the following releases which contain a fix</p> <ul>
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.3.7" target="_blank" rel="noopener noreferrer">Zeebe, Operate and Tasklist 1.3.7</a></li> 
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.2.12" target="_blank" rel="noopener noreferrer">Zeebe, Operate and Tasklist 1.2.12</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 8</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-8</link>
  <guid isPermaLink="false">camunda-security-notice-8</guid>
  <pubDate>Fri, 31 Dec 2021 00:00:00 GMT</pubDate>
  <description>Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-44832.
At this point, Camunda is not aware of any specific attac...</description>
  <category>Zeebe, Operate, Tasklist</category>
  <content:encoded><![CDATA[<p>Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2021-44832</a>.
At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate or Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.</p> <h3 id="how-to-determine-if-the-installation-is-affected-35">How to determine if the installation is affected</h3> <p>You are using Zeebe, Operate or Tasklist version ≤ 1.2.8 or ≤ 1.1.9</p> <h3 id="solution-35">Solution</h3> <p>Camunda has provided the following releases which contain a fix</p> <ul>
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.2.9" target="_blank" rel="noopener noreferrer">Zeebe, Operate and Tasklist 1.2.9</a></li> 
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.1.10" target="_blank" rel="noopener noreferrer">Zeebe, Operate and Tasklist 1.1.10</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 7</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-7</link>
  <guid isPermaLink="false">camunda-security-notice-7</guid>
  <pubDate>Fri, 31 Dec 2021 00:00:00 GMT</pubDate>
  <description>IAM bundles log4j libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-44832.
Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does n...</description>
  <category>IAM</category>
  <content:encoded><![CDATA[<p>IAM bundles log4j libraries for which the following CVE has been published: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2021-44832</a>.
Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does not bundle the log4j-core library which contains the vulnerability referred to by the CVE. As a result, Camunda does not consider IAM to be affected by the vulnerability. Still, Camunda recommends applying fixes as mentioned in the Solution section below.</p> <h3 id="how-to-determine-if-the-installation-is-affected-36">How to determine if the installation is affected</h3> <p>You are using IAM version ≤ 1.2.8</p> <h3 id="solution-36">Solution</h3> <p>Camunda has provided the following releases which contain a fix</p> <ul>
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.2.9" target="_blank" rel="noopener noreferrer">IAM 1.2.9</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 6</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-6</link>
  <guid isPermaLink="false">camunda-security-notice-6</guid>
  <pubDate>Wed, 22 Dec 2021 00:00:00 GMT</pubDate>
  <description>Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-45105.
At this point, Camunda is not aware of any specific attac...</description>
  <category>Zeebe, Operate, Tasklist</category>
  <content:encoded><![CDATA[<p>Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45105" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2021-45105</a>.
At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate or Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.</p> <h3 id="how-to-determine-if-the-installation-is-affected-37">How to determine if the installation is affected</h3> <p>You are using Zeebe, Operate or Tasklist version ≤ 1.2.7 or ≤ 1.1.8</p> <h3 id="solution-37">Solution</h3> <p>Camunda has provided the following releases which contain a fix</p> <ul>
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.2.8" target="_blank" rel="noopener noreferrer">Zeebe, Operate and Tasklist 1.2.8</a></li> 
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.1.9" target="_blank" rel="noopener noreferrer">Zeebe, Operate and Tasklist 1.1.9</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 5</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-5</link>
  <guid isPermaLink="false">camunda-security-notice-5</guid>
  <pubDate>Wed, 22 Dec 2021 00:00:00 GMT</pubDate>
  <description>IAM bundles log4j libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-45105.
Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does n...</description>
  <category>IAM</category>
  <content:encoded><![CDATA[<p>IAM bundles log4j libraries for which the following CVE has been published: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45105" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2021-45105</a>.
Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does not bundle the log4j-core library which contains the vulnerability referred to by the CVE. As a result, Camunda does not consider IAM to be affected by the vulnerability. Still, Camunda recommends applying fixes as mentioned in the Solution section below.</p> <p>IAM bundles logback libraries for which the following CVE has been published: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42550" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2021-42550</a>.
At this point, Camunda is not aware of any specific attack vector in IAM allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.</p> <h3 id="how-to-determine-if-the-installation-is-affected-38">How to determine if the installation is affected</h3> <p>You are using IAM version ≤ 1.2.7</p> <h3 id="solution-38">Solution</h3> <p>Camunda has provided the following releases which contain a fix</p> <ul>
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.2.8" target="_blank" rel="noopener noreferrer">IAM 1.2.8</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 4</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-4</link>
  <guid isPermaLink="false">camunda-security-notice-4</guid>
  <pubDate>Fri, 17 Dec 2021 00:00:00 GMT</pubDate>
  <description>Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-45046.
At this point, Camunda is not aware of any specific attac...</description>
  <category>Zeebe, Operate, Tasklist</category>
  <content:encoded><![CDATA[<p>Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2021-45046</a>.
At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate or Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.</p> <h3 id="how-to-determine-if-the-installation-is-affected-39">How to determine if the installation is affected</h3> <p>You are using Zeebe, Operate or Tasklist version ≤ 1.2.6 or ≤ 1.1.7</p> <h3 id="solution-39">Solution</h3> <p>Camunda has provided the following releases which contain a fix</p> <ul>
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.2.7" target="_blank" rel="noopener noreferrer">Zeebe, Operate and Tasklist 1.2.7</a></li> 
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.1.8" target="_blank" rel="noopener noreferrer">Zeebe, Operate and Tasklist 1.1.8</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 3</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-3</link>
  <guid isPermaLink="false">camunda-security-notice-3</guid>
  <pubDate>Fri, 17 Dec 2021 00:00:00 GMT</pubDate>
  <description>IAM bundles log4j libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-45046.
Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does n...</description>
  <category>IAM</category>
  <content:encoded><![CDATA[<p>IAM bundles log4j libraries for which the following CVE has been published: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2021-45046</a>.
Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does not bundle the log4j-core library which contains the vulnerability referred to by the CVE. As a result, Camunda does not consider IAM to be affected by the vulnerability. Still, Camunda recommends applying fixes as mentioned in the Solution section below.</p> <p>IAM bundles logback libraries for which the following CVE has been published: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-42550" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2021-42550</a>.
At this point, Camunda is not aware of any specific attack vector in IAM allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.</p> <h3 id="how-to-determine-if-the-installation-is-affected-40">How to determine if the installation is affected</h3> <p>You are using IAM version ≤ 1.2.6</p> <h3 id="solution-40">Solution</h3> <p>Camunda has provided the following releases which contain a fix</p> <ul>
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.2.7" target="_blank" rel="noopener noreferrer">IAM 1.2.7</a></li> 
</ul> ]]></content:encoded>
</item>
<item>
  <title>Notice 2</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-2</link>
  <guid isPermaLink="false">camunda-security-notice-2</guid>
  <pubDate>Tue, 14 Dec 2021 00:00:00 GMT</pubDate>
  <description>Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-44228.
At this point, Camunda is not aware of any specific attac...</description>
  <category>Zeebe, Operate, Tasklist</category>
  <content:encoded><![CDATA[<p>Zeebe, Operate and Tasklist bundle log4j-core for which the following CVE has been published: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2021-44228</a>.
At this point, Camunda is not aware of any specific attack vector in Zeebe, Operate or Tasklist allowing attackers to exploit the vulnerability but recommends applying fixes as mentioned in the Solution section below.</p> <h3 id="how-to-determine-if-the-installation-is-affected-41">How to determine if the installation is affected</h3> <p>You are using Zeebe, Operate or Tasklist version ≤ 1.2.5 or ≤ 1.1.6</p> <h3 id="solution-41">Solution</h3> <p>Camunda has provided the following releases which contain a fix</p> <ul>
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.2.6" target="_blank" rel="noopener noreferrer">Zeebe, Operate and Tasklist 1.2.6</a></li> 
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.1.7" target="_blank" rel="noopener noreferrer">Zeebe, Operate and Tasklist 1.1.7</a></li> 
</ul> <p>Apply the patches mentioned above or set the JVM option <code>-Dlog4j2.formatMsgNoLookups=true</code></p> ]]></content:encoded>
</item>
<item>
  <title>Notice 1</title>
  <link>https://unsupported.docs.camunda.io/8.6/docs/reference/notices/#notice-1</link>
  <guid isPermaLink="false">camunda-security-notice-1</guid>
  <pubDate>Tue, 14 Dec 2021 00:00:00 GMT</pubDate>
  <description>IAM bundles log4j libraries for which the following CVE has been published: https://nvd.nist.gov/vuln/detail/CVE-2021-44228.
Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does n...</description>
  <category>IAM</category>
  <content:encoded><![CDATA[<p>IAM bundles log4j libraries for which the following CVE has been published: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228" target="_blank" rel="noopener noreferrer">https://nvd.nist.gov/vuln/detail/CVE-2021-44228</a>.
Specifically, IAM bundles log4j-api and log4j-to-slf4j. However, IAM does not bundle the log4j-core library which contains the vulnerability referred to by the CVE. As a result, Camunda does not consider IAM to be affected by the vulnerability.</p> <p>Still, Camunda recommends applying fixes as mentioned in the Solution section below.</p> <h3 id="how-to-determine-if-the-installation-is-affected-42">How to determine if the installation is affected</h3> <p>You are using IAM version ≤ 1.2.5</p> <h3 id="solution-42">Solution</h3> <p>Camunda has provided the following releases which contain a fix</p> <ul>
<li><a href="https://github.com/camunda-cloud/zeebe/releases/tag/1.2.6" target="_blank" rel="noopener noreferrer">IAM 1.2.6</a></li> 
</ul> ]]></content:encoded>
</item>
</channel>
</rss>
