Home

Description

ServiceNow has addressed a remote code execution vulnerability that was identified in the ServiceNow AI platform. This vulnerability could enable an unauthenticated user, in certain circumstances, to execute code within the ServiceNow Sandbox. ServiceNow addressed this vulnerability by deploying a security update to hosted instances. Relevant security updates also have been provided to ServiceNow self-hosted customers and partners. Further, the vulnerability is addressed in the listed patches and hot fixes. While we are not currently aware of exploitation against customer instances, we recommend customers promptly apply appropriate updates or upgrade if they have not already done so.

PUBLISHED Reserved 2025-12-30 | Published 2026-02-25 | Updated 2026-02-26 | Assigner SN




CRITICAL: 9.2CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-653: Improper Isolation or Compartmentalization

Product status

Default status
unaffected

Any version before Australia
affected

Any version before Zurich Patch 5
affected

Any version before Zurich Patch 4 Hot Fix 3b
affected

Any version before Yokohama Patch 12
affected

Any version before Yokohama Patch 10 Hot Fix 1b
affected

Any version before Xanadu Patch 11 Hot Fix 1a
affected

Credits

Lockheed Martin - Red Team finder

References

support.servicenow.com/...cle_view&sysparm_article=KB2693566

cve.org (CVE-2026-0542)

nvd.nist.gov (CVE-2026-0542)

Download JSON