Platform
java
Component
org.apache.ranger:ranger-plugins-common
Fixed in
2.7.1
2.8.0
A critical Remote Code Execution (RCE) vulnerability (CVE-2025-59059) has been identified in Apache Ranger Plugins Common versions up to 2.7.0. This vulnerability resides within the NashornScriptEngineCreator component and allows attackers to potentially execute arbitrary code on affected systems. Users are strongly advised to upgrade to version 2.8.0 to address this security risk.
The NashornScriptEngineCreator component in Apache Ranger Plugins Common is vulnerable to RCE. An attacker could craft malicious scripts that, when processed by the component, would lead to arbitrary code execution on the server. This could grant the attacker complete control over the Ranger server, enabling them to steal sensitive data, modify configurations, or even pivot to other systems within the network. The potential impact is significant, as Ranger is often used to manage and enforce security policies across various data sources, making it a high-value target for attackers. Successful exploitation could lead to widespread data breaches and system compromise.
CVE-2025-59059 was published on 2026-03-03. The vulnerability's severity is rated as CRITICAL (CVSS 9.8). There are currently no publicly available proof-of-concept exploits. It is not listed on the CISA KEV catalog as of this writing. The Nashorn scripting engine has been a source of vulnerabilities in the past, highlighting the importance of keeping dependencies up to date.
Exploit Status
EPSS
0.42% (62% percentile)
CVSS Vector
The primary mitigation for CVE-2025-59059 is to upgrade Apache Ranger Plugins Common to version 2.8.0 or later, which contains the fix. If an immediate upgrade is not feasible due to compatibility issues or downtime constraints, consider implementing temporary workarounds. While no specific WAF rules are readily available, restricting access to the NashornScriptEngineCreator component or implementing strict input validation on any scripts processed by it could reduce the attack surface. Monitor Ranger logs for any suspicious activity related to script execution. After upgrading, confirm the fix by attempting to execute a known malicious script and verifying that it is blocked or handled safely.
Upgrade Apache Ranger to version 2.8.0 or higher. This version corrects the remote code execution vulnerability in NashornScriptEngineCreator. Updating is the safest way to mitigate this risk.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2025-59059 is a critical Remote Code Execution vulnerability in Apache Ranger Plugins Common versions up to 2.7.0, allowing attackers to execute arbitrary code.
Yes, if you are using Apache Ranger Plugins Common versions 2.7.0 or earlier, you are vulnerable to this RCE.
Upgrade Apache Ranger Plugins Common to version 2.8.0 or later to remediate the vulnerability.
As of now, there are no confirmed reports of active exploitation, but the vulnerability's severity warrants immediate attention.
Refer to the Apache Ranger security page for the latest information and advisory: [https://ranger.apache.org/security/](https://ranger.apache.org/security/)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.
Upload your pom.xml file and we'll tell you instantly if you're affected.