Siemens Mendix Applications
An expression injection vulnerability in Mendix Runtime Workflow processing allows authenticated users to inject malicious expressions that execute during workflow processing. This could allow a malicious user with application access to leak sensitive information such as credentials, configuration data, or business data accessible to the application. The vulnerability affects Mendix 9 versions 9.11 through 9.14 (fixed in 9.15) and Mendix 9.12 versions before 9.12.3. The vulnerability only impacts applications that actually use the Mendix Workflow visual language feature.
- Valid user credentials for the Mendix application
- Ability to create or modify workflows in the Mendix application
- Application must use Mendix Workflow functionality
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c4097e2e-372a-4640-adb0-c8f92273842fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.