Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-xte1-h9nn-4bbk
Vulnerability ID VCID-xte1-h9nn-4bbk
Aliases CVE-2026-22018
Summary Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Status Published
Exploitability 0.5
Weighted Severity 3.3
Risk 1.6
Affected and Fixed Packages Package Details
Weaknesses (1)
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22018.json
https://api.first.org/data/v1/epss?cve=CVE-2026-22018
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22018
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
1134894 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1134894
2460041 https://bugzilla.redhat.com/show_bug.cgi?id=2460041
cpuapr2026.html https://www.oracle.com/security-alerts/cpuapr2026.html
RHSA-2026:11403 https://access.redhat.com/errata/RHSA-2026:11403
RHSA-2026:11655 https://access.redhat.com/errata/RHSA-2026:11655
RHSA-2026:11822 https://access.redhat.com/errata/RHSA-2026:11822
RHSA-2026:11829 https://access.redhat.com/errata/RHSA-2026:11829
RHSA-2026:11902 https://access.redhat.com/errata/RHSA-2026:11902
RHSA-2026:9254 https://access.redhat.com/errata/RHSA-2026:9254
RHSA-2026:9255 https://access.redhat.com/errata/RHSA-2026:9255
RHSA-2026:9256 https://access.redhat.com/errata/RHSA-2026:9256
RHSA-2026:9682 https://access.redhat.com/errata/RHSA-2026:9682
RHSA-2026:9683 https://access.redhat.com/errata/RHSA-2026:9683
RHSA-2026:9684 https://access.redhat.com/errata/RHSA-2026:9684
RHSA-2026:9685 https://access.redhat.com/errata/RHSA-2026:9685
RHSA-2026:9686 https://access.redhat.com/errata/RHSA-2026:9686
RHSA-2026:9687 https://access.redhat.com/errata/RHSA-2026:9687
RHSA-2026:9688 https://access.redhat.com/errata/RHSA-2026:9688
RHSA-2026:9689 https://access.redhat.com/errata/RHSA-2026:9689
RHSA-2026:9690 https://access.redhat.com/errata/RHSA-2026:9690
RHSA-2026:9691 https://access.redhat.com/errata/RHSA-2026:9691
RHSA-2026:9693 https://access.redhat.com/errata/RHSA-2026:9693
RHSA-2026:9694 https://access.redhat.com/errata/RHSA-2026:9694
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22018.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://www.oracle.com/security-alerts/cpuapr2026.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T14:05:52Z/ Found at https://www.oracle.com/security-alerts/cpuapr2026.html
Exploit Prediction Scoring System (EPSS)
Percentile 0.11666
EPSS Score 0.00039
Published At April 24, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-23T01:20:28.860733+00:00 Vulnrichment Import https://github.com/cisagov/vulnrichment/blob/develop/2026/22xxx/CVE-2026-22018.json 38.4.0