CVE-2025-32896
Apache SeaTunnel: Unauthenticated insecure access
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
# Summary Unauthorized users can perform Arbitrary File Read and Deserialization
attack by submit job using restful api-v1. # Details
Unauthorized users can access `/hazelcast/rest/maps/submit-job` to submit
job.
An attacker can set extra params in mysql url to perform Arbitrary File
Read and Deserialization attack. This issue affects Apache SeaTunnel: <=2.3.10 # Fixed Users are recommended to upgrade to version 2.3.11, and enable restful api-v2 & open https two-way authentication , which fixes the issue.
# Summary Unauthorized users can perform Arbitrary File Read and Deserialization attack by submit job using restful api-v1. # Details Unauthorized users can access `/hazelcast/rest/maps/submit-job` to submit job. An attacker can set extra params in mysql url to perform Arbitrary File Read and Deserialization attack. This issue affects Apache SeaTunnel: <=2.3.10 # Fixed Users are recommended to upgrade to version 2.3.11, and enable restful api-v2 & open https two-way authentication , which fixes the issue.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2025-04-12 CVE Reserved
- 2025-06-19 CVE Published
- 2025-06-20 CVE Updated
- 2025-07-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-306: Missing Authentication for Critical Function
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2025/04/12/1 |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/apache/seatunnel/pull/9010 | 2025-06-19 |
URL | Date | SRC |
---|---|---|
https://lists.apache.org/thread/qvh3zyt1jr25rgvw955rb8qjrnbxfro9 | 2025-06-19 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Software Foundation Search vendor "Apache Software Foundation" | Apache SeaTunnel Search vendor "Apache Software Foundation" for product "Apache SeaTunnel" | >= 2.3.1 <= 2.3.10 Search vendor "Apache Software Foundation" for product "Apache SeaTunnel" and version " >= 2.3.1 <= 2.3.10" | en |
Affected
|