The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-35036

CVE-2025-35036: Redhat Hibernate Validator RCE Flaw

CVE-2025-35036 is a remote code execution vulnerability in Redhat Hibernate Validator that exploits Expression Language interpolation to execute arbitrary code. This article covers technical details, affected versions, and mitigation.

Updated: January 22, 2026

CVE-2025-35036 Overview

CVE-2025-35036 is a Code Injection vulnerability affecting Hibernate Validator before versions 6.2.0 and 7.0.0. By default and depending on how it is used, vulnerable versions may interpolate user-supplied input in constraint violation messages with Expression Language (EL). This could allow an attacker to access sensitive information or execute arbitrary Java code on the target system.

Hibernate Validator as of versions 6.2.0 and 7.0.0 no longer interpolates custom constraint violation messages with Expression Language and strongly recommends not allowing user-supplied input in constraint violation messages. This vulnerability is related to downstream vulnerabilities CVE-2020-5245 and CVE-2025-4428, which both involve Expression Language interpolation of user-supplied data.

Critical Impact

Attackers can exploit EL injection to execute arbitrary Java code or extract sensitive data from applications using vulnerable Hibernate Validator versions.

Affected Products

  • Red Hat Hibernate Validator versions prior to 6.2.0
  • Red Hat Hibernate Validator versions prior to 7.0.0
  • Applications using custom constraint validators with user-supplied input in violation messages

Discovery Timeline

  • June 3, 2025 - CVE-2025-35036 published to NVD
  • September 18, 2025 - Last updated in NVD database

Technical Details for CVE-2025-35036

Vulnerability Analysis

The vulnerability exists in the constraint violation message handling mechanism within Hibernate Validator. When developers create custom constraint validators and include user-supplied data in the violation message, the Expression Language engine processes this input, enabling injection attacks.

Expression Language in Java EE/Jakarta EE applications provides a powerful mechanism for dynamic content evaluation. However, when user-controlled input is passed to the EL interpreter without proper sanitization, attackers can craft malicious payloads that execute arbitrary Java code or access sensitive application context data.

The root issue stems from the default behavior of Hibernate Validator's HibernateConstraintValidatorContext which would process EL expressions in custom constraint violation messages. This design choice, while convenient for developers, created a dangerous attack surface when combined with unsanitized user input.

Root Cause

The vulnerability is caused by unsafe Expression Language interpolation in constraint violation messages. When custom constraint validators build violation messages using HibernateConstraintValidatorContext.buildConstraintViolationWithTemplate() and include user-supplied input, the EL engine evaluates any embedded expressions. This allows attackers to inject EL expressions that can invoke arbitrary Java methods, access class loaders, and execute system commands.

The Hibernate Issue HV-1816 documents the security concerns that led to the architectural changes in versions 6.2.0 and 7.0.0. The fix involved disabling EL interpolation by default and requiring explicit opt-in for such functionality.

Attack Vector

The attack vector is network-based and does not require authentication. An attacker can exploit this vulnerability by submitting specially crafted input to application endpoints that perform validation using Hibernate Validator. The malicious input contains EL expressions that, when included in a constraint violation message and processed by the vulnerable EL interpolation logic, execute the attacker's payload.

Common exploitation scenarios include:

  • Injecting EL expressions through form fields that trigger validation errors
  • Exploiting API endpoints that validate request bodies and return detailed error messages
  • Targeting applications that echo user input in validation error responses

The Watchtowr Exploit Analysis provides detailed technical insights into similar EL injection exploitation techniques affecting downstream products.

Detection Methods for CVE-2025-35036

Indicators of Compromise

  • Unusual EL expression patterns in application logs such as ${...} or #{...} in user input fields
  • Evidence of java.lang.Runtime or ProcessBuilder invocation attempts in validation error contexts
  • Unexpected outbound network connections originating from application processes
  • Application exceptions related to EL evaluation in constraint validation stack traces

Detection Strategies

  • Monitor application logs for EL expression syntax patterns in user-submitted data
  • Implement Web Application Firewall (WAF) rules to detect and block common EL injection payloads
  • Deploy runtime application self-protection (RASP) solutions to detect EL injection attempts
  • Review application code for use of HibernateConstraintValidatorContext.buildConstraintViolationWithTemplate() with user input

Monitoring Recommendations

  • Enable verbose logging for Hibernate Validator components to capture validation processing details
  • Configure security monitoring tools to alert on Java process spawning from web application contexts
  • Implement centralized logging to correlate potential exploitation attempts across application instances
  • Set up alerts for validation-related exceptions that may indicate exploitation attempts

How to Mitigate CVE-2025-35036

Immediate Actions Required

  • Upgrade Hibernate Validator to version 6.2.0.Final or later for the 6.x branch
  • Upgrade Hibernate Validator to version 7.0.0.Final or later for the 7.x branch
  • Audit custom constraint validators for user input in violation messages
  • Implement input validation and sanitization at application entry points

Patch Information

The vulnerability has been addressed in Hibernate Validator versions 6.2.0 and 7.0.0. Multiple commits were applied to resolve this issue:

  • Security commit 05f795bb
  • Security commit 254858d9
  • Security commit d2db40b9
  • Security commit e076293b

The Hibernate Validator Migration Guide provides detailed upgrade instructions. The version comparison between 6.1.7.Final and 6.2.0.Final shows all security-related changes.

Workarounds

  • Avoid including user-supplied input directly in constraint violation messages
  • Sanitize and escape all user input before including it in validation error messages
  • Use parameterized messages with message codes instead of dynamic string construction
  • Consider disabling EL interpolation in constraint messages if upgrading is not immediately possible
bash
# Maven dependency update example
# Update pom.xml to use patched version
# For 6.x branch:
# <dependency>
#     <groupId>org.hibernate.validator</groupId>
#     <artifactId>hibernate-validator</artifactId>
#     <version>6.2.0.Final</version>
# </dependency>

# Verify current Hibernate Validator version
mvn dependency:tree -Dincludes=org.hibernate.validator:hibernate-validator

# Check for vulnerable versions in project
grep -r "hibernate-validator" pom.xml build.gradle

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechHibernate Validator

  • SeverityMEDIUM

  • CVSS Score6.9

  • EPSS Probability0.27%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityLow
  • CWE References
  • CWE-94
  • Technical References
  • Hibernate Validator Context Reference

  • Hibernate Validator Version Comparison

  • Hibernate Validator Pull Request

  • Hibernate Issue HV-1816

  • Hibernate Validator Migration Guide

  • Hibernate Blog Post on Release

  • Watchtowr Exploit Analysis

  • CVE-2020-5245 Record

  • CVE-2025-4428 Record
  • Vendor Resources
  • Hibernate Validator Commit Update

  • Hibernate Validator Commit Update

  • Hibernate Validator Commit Update

  • Hibernate Validator Commit Update
  • Related CVEs
  • CVE-2020-10693: Hibernate Validator Auth Bypass Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English