- GraalVM Release Calendar
- Vulnerability Advisories
- GraalVM 25
- GraalVM for JDK 24
- GraalVM for JDK 23
- GraalVM for JDK 22
- GraalVM for JDK 21
- GraalVM for JDK 20
- GraalVM for JDK 17
- GraalVM 22.3.x
- GraalVM 22.2.x
- GraalVM 22.1.x
- GraalVM 22.0.x
- GraalVM 21.3.x
- GraalVM 21.2.x
- GraalVM 21.1.x
- GraalVM 21.0.x
- GraalVM 20.3.x
- GraalVM 20.2.x
- GraalVM 20.1.x
- GraalVM 20.0.x
- GraalVM 19.3.x
GraalVM Vulnerability Advisories
Oracle takes security vulnerabilities seriously. If you have discovered a security vulnerability in GraalVM, please report it according to the Oracle vulnerability disclosure process.
This page provides information about security vulnerabilities that have been identified and addressed in GraalVM releases.
Security Updates
January 2026
The following vulnerabilities were fixed in this release.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | Notes | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Required |
User Interaction |
Scope | Confidentiality | Integrity | Availability | |||||||
| CVE-2026-21945 | Oracle GraalVM, Oracle GraalVM Enterprise Edition |
Security | Multiple | Yes | 7.5 | Network | Low | None | None | Unchanged | None | None | High |
|
See Note 1 |
| CVE-2026-21932 | Oracle GraalVM, Oracle GraalVM Enterprise Edition |
AWT, JavaFX |
Multiple | Yes | 7.4 | Network | Low | None | Required | Changed | None | High | None |
|
See Note 1 |
| CVE-2026-21933 | Oracle GraalVM, Oracle GraalVM Enterprise Edition |
Networking | Multiple | Yes | 6.1 | Network | Low | None | Required | Changed | Low | Low | None |
|
See Note 2 |
| CVE-2026-21933 | Oracle GraalVM, Oracle GraalVM Enterprise Edition |
RMI | Multiple | Yes | 4.8 | Network | High | None | None | Unchanged | Low | Low | None |
|
See Note 2 |
Notes:
- This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
- This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
October 2025
The following vulnerabilities were fixed in this release.
| CVE ID | Product | Component | Protocol | Remote Exploit without Auth.? |
CVSS VERSION 3.1 RISK (see Risk Matrix Definitions) | Supported Versions Affected | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Base Score |
Attack Vector |
Attack Complex |
Privs Required |
User Interaction |
Scope | Confidentiality | Integrity | Availability | ||||||
| CVE-2025-53057 | Oracle GraalVM, Oracle GraalVM Enterprise Edition |
Security | Multiple | Yes | 5.9 | Network | High | None | None | Unchanged | None | High | None |
|
| CVE-2025-53066 | Oracle GraalVM, Oracle GraalVM Enterprise Edition |
JAXP | Multiple | Yes | 4.8 | Network | High | None | None | Unchanged | Low | None | Low |
|
| CVE-2025-61755 | Oracle GraalVM | Compiler | Multiple | Yes | 3.7 | Network | High | None | None | Unchanged | Low | None | None |
|
| CVE-2025-61748 | Oracle GraalVM, Oracle GraalVM Enterprise Edition |
Libraries | Multiple | Yes | 3.7 | Network | High | None | None | Unchanged | None | Low | None |
|
Staying Informed
To stay informed about GraalVM security updates:
- Subscribe to Oracle Security Alerts: Sign up for notifications at Oracle Security Alerts
- Monitor GraalVM Release Notes: Check the GraalVM Release Notes for security-related updates
- Follow GraalVM Community: Join the GraalVM community for announcements