Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.3
OpenTelemetry Java: Unrestricted Code Can Run on Your Server
GHSA-xw7x-h9fj-p2c7
CVE-2026-33701
GHSA-xw7x-h9fj-p2c7
Summary
If you use OpenTelemetry Java with a remote management port, a malicious person could potentially take control of your server by sending it a specially crafted message. This only happens if you have a specific library installed and the OpenTelemetry Java agent is running. To fix this, update OpenTelemetry Java to version 2.26.1 or later, or disable the RMI integration by setting a system property.
What to do
- Update opentelemetry io.opentelemetry.javaagent:opentelemetry-javaagent to version 2.26.1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| opentelemetry | io.opentelemetry.javaagent:opentelemetry-javaagent | <= 2.26.1 | 2.26.1 |
Original title
OpenTelemetry Java Instrumentation provides OpenTelemetry auto-instrumentation and instrumentation libraries for Java. In versions prior to 2.26.1, the RMI instrumentation registered a custom endpo...
Original description
OpenTelemetry Java Instrumentation provides OpenTelemetry auto-instrumentation and instrumentation libraries for Java. In versions prior to 2.26.1, the RMI instrumentation registered a custom endpoint that deserialized incoming data without applying serialization filters. On JDK version 16 and earlier, an attacker with network access to a JMX or RMI port on an instrumented JVM could exploit this to potentially achieve remote code execution. All three of the following conditions must be true to exploit this vulnerability: First, OpenTelemetry Java instrumentation is attached as a Java agent (`-javaagent`) on Java 16 or earlier. Second, JMX/RMI port has been explicitly configured via `-Dcom.sun.management.jmxremote.port` and is network-reachable. Third, gadget-chain-compatible library is present on the classpath. This results in arbitrary remote code execution with the privileges of the user running the instrumented JVM. For JDK >= 17, no action is required, but upgrading is strongly encouraged. For JDK < 17, upgrade to version 2.26.1 or later. As a workaround, set the system property `-Dotel.instrumentation.rmi.enabled=false` to disable the RMI integration.
ghsa CVSS4.0
9.3
Vulnerability type
CWE-502
Deserialization of Untrusted Data
- https://github.com/open-telemetry/opentelemetry-java-instrumentation/security/ad...
- https://github.com/open-telemetry/opentelemetry-java-instrumentation/commit/9cf4...
- https://github.com/open-telemetry/opentelemetry-java-instrumentation/releases/ta...
- https://github.com/advisories/GHSA-xw7x-h9fj-p2c7
- https://github.com/open-telemetry/opentelemetry-java-instrumentation Product
Published: 27 Mar 2026 · Updated: 27 Mar 2026 · First seen: 25 Mar 2026