JustAppSec
Back to news

Nexus Repository patches hard-coded credential enabling unauthenticated commands

2 min readPublished 15 Apr 2026Updated 15 Apr 2026Source: Sonatype Support

TL;DR — A hard-coded credential in Nexus Repository 3’s internal database component can enable unauthenticated attackers to execute commands on the host if the OrientDB binary listener is enabled.

What happened

Sonatype Nexus Repository is a widely deployed artifact repository manager used to proxy, store, and publish build outputs (e.g., Maven, npm, Docker) in CI/CD pipelines.

Sonatype published an advisory for CVE-2026-5189, describing a hardcoded credential in an internal database component that could allow an unauthenticated attacker with network access to gain unauthorized access to Nexus Repository’s internal database and execute commands on the host system.

A key constraint called out by Sonatype: exploitation requires a non-default configuration. Specifically, customers who have not enabled the OrientDB binary listener are stated to be not affected.

Why this matters: compromise of an artifact repository is a direct software supply chain risk — it can impact downstream builds, published dependencies, and developer trust boundaries across multiple teams.

Who is impacted

  • Deployments running Sonatype Nexus Repository 3.x CE/Pro where the OrientDB binary listener has been explicitly enabled.
  • Sonatype states the affected range is 3.0.0 through 3.70.5.
ProductAffected versions (per vendor)Fixed version (per vendor)
Sonatype Nexus Repository 3.x (CE/Pro)3.0.0 through 3.70.53.71.0

What to do now

  • Follow vendor remediation guidance and apply the latest patched release available at the time of writing.

    "Customers using Nexus Repository 3 versions 3.0.0 through 3.70.5 should upgrade to version 3.71.0 or later"

  • Review whether the vulnerable exposure condition is present in your deployment configuration.

    "review their nexus.properties configuration file for the presence of nexus.orient.binaryListenerEnabled=true"

  • If the setting is present, validate whether it’s required for your environment; Sonatype explicitly describes removing it as an immediate mitigation when not needed.

    "If this setting is present and not required, it should be removed as an immediate mitigation measure."

  • Treat this as a supply-chain incident-prep scenario: inventory which build systems and release pipelines trust this Nexus instance, and ensure you can rapidly rotate credentials/tokens used by CI if compromise is suspected.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.