CVE-2016-15057

CRITICAL
9.9
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Mar 12, 2026 - 22:00 vuln.today
CVE Published
Jan 26, 2026 - 12:15 nvd
CRITICAL 9.9

Description

** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Continuum. This issue affects Apache Continuum: all versions. Attackers with access to the installations REST API can use this to invoke arbitrary commands on the server. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Analysis

Command injection in Apache Continuum (unsupported). EPSS 37.9% indicates active exploitation of this legacy CI/CD system. No patch available — product is end-of-life.

Technical Context

CWE-77 in Apache Continuum, a legacy continuous integration server. Marked as 'UNSUPPORTED WHEN ASSIGNED' — no fix will be released.

Affected Products

['Apache Continuum (all versions, EOL)']

Remediation

Decommission Apache Continuum immediately. Migrate to actively maintained CI/CD (Jenkins, GitLab CI, etc.).

Priority Score

87
Low Medium High Critical
KEV: 0
EPSS: +37.9
CVSS: +50
POC: 0

Share

CVE-2016-15057 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy