LOWCVE-2025-32896CVSS 2.5

Apache SeaTunnel: Unauthenticated insecure access

अनुवाद हो रहा है…

प्लेटफ़ॉर्म

java

घटक

org.apache.seatunnel:seatunnel-engine-server

में ठीक किया गया

2.3.11

2.3.11

AI Confidence: highNVDEPSS 0.2%समीक्षित: मई 2026
आपकी भाषा में अनुवाद हो रहा है…

CVE-2025-32896 describes an Arbitrary File Read and Deserialization vulnerability discovered in Apache SeaTunnel. This vulnerability allows unauthorized users to perform malicious actions by exploiting the /hazelcast/rest/maps/submit-job endpoint. The vulnerability impacts versions of Apache SeaTunnel up to and including 2.3.9, and a fix is available in version 2.3.11.

Java / Maven

इस CVE को अपने प्रोजेक्ट में पहचानें

अपनी pom.xml फ़ाइल अपलोड करें और तुरंत जानें कि आप प्रभावित हैं या नहीं।

pom.xml अपलोड करेंसमर्थित प्रारूप: pom.xml · build.gradle

प्रभाव और हमले की स्थितियाँअनुवाद हो रहा है…

An attacker can leverage this vulnerability to read arbitrary files from the SeaTunnel server's file system. By manipulating extra parameters within the MySQL URL during job submission, they can trigger deserialization of malicious objects, potentially leading to remote code execution. The blast radius extends to any data accessible by the SeaTunnel process, and successful exploitation could compromise the entire system. This vulnerability shares similarities with other deserialization vulnerabilities where attackers can inject malicious code through crafted input.

शोषण संदर्भअनुवाद हो रहा है…

This CVE was published on 2025-06-19. No public proof-of-concept (PoC) code has been released at the time of writing. The vulnerability is not currently listed on the CISA KEV catalog. The CVSS score of 2.5 indicates a low probability of exploitation, but the potential impact warrants prompt remediation.

कौन जोखिम में हैअनुवाद हो रहा है…

Organizations using Apache SeaTunnel for data integration and transformation pipelines, particularly those relying on the /hazelcast/rest/maps/submit-job endpoint for job submission, are at risk. Environments with weak access controls or legacy configurations are especially vulnerable.

पहचान के चरणअनुवाद हो रहा है…

• linux / server:

journalctl -u seatunnel -g "arbitrary file read"

• java / supply-chain: Inspect SeaTunnel job submissions for unusual MySQL URL parameters. Look for patterns indicative of file path manipulation. • generic web:

curl -I /hazelcast/rest/maps/submit-job | grep -i 'content-type: application/json'

Check for unexpected content types in the response, which might indicate a deserialization attempt.

हमले की समयरेखा

  1. Disclosure

    disclosure

खतरा खुफिया

एक्सप्लॉइट स्थिति

प्रूफ ऑफ कॉन्सेप्टअज्ञात
CISA KEVNO

EPSS

0.19% (41% शतमक)

प्रभावित सॉफ्टवेयर

घटकorg.apache.seatunnel:seatunnel-engine-server
विक्रेताosv
प्रभावित श्रेणीमें ठीक किया गया
2.3.1 – 2.3.102.3.11
2.3.11

कमजोरी वर्गीकरण (CWE)

समयरेखा

  1. आरक्षित
  2. प्रकाशित
  3. EPSS अद्यतन

शमन और वर्कअराउंडअनुवाद हो रहा है…

The primary mitigation is to upgrade Apache SeaTunnel to version 2.3.11 or later. This version includes a fix that addresses the vulnerability. As an interim measure, consider disabling the /hazelcast/rest/maps/submit-job endpoint if it's not essential. Enabling restful api-v2 and enforcing HTTPS two-way authentication will further restrict access and reduce the attack surface. Review and restrict access to the SeaTunnel environment, limiting user privileges to the minimum necessary.

कैसे ठीक करेंअनुवाद हो रहा है…

Actualice Apache SeaTunnel a la versión 2.3.11 o superior. Además, habilite la API RESTful v2 y configure la autenticación HTTPS bidireccional para mitigar la vulnerabilidad.

CVE सुरक्षा न्यूज़लेटर

भेद्यता विश्लेषण और गंभीर अलर्ट सीधे आपके ईमेल में।

अक्सर पूछे जाने वाले सवालअनुवाद हो रहा है…

What is CVE-2025-32896 — Arbitrary File Read/Deserialization in Apache SeaTunnel?

CVE-2025-32896 is a LOW severity vulnerability affecting Apache SeaTunnel versions up to 2.3.9, allowing unauthorized users to read arbitrary files and potentially execute code through the submit-job API.

Am I affected by CVE-2025-32896 in Apache SeaTunnel?

You are affected if you are using Apache SeaTunnel version 2.3.9 or earlier. Upgrade to version 2.3.11 to resolve the issue.

How do I fix CVE-2025-32896 in Apache SeaTunnel?

Upgrade to Apache SeaTunnel version 2.3.11. Additionally, enable restful api-v2 and HTTPS two-way authentication for enhanced security.

Is CVE-2025-32896 being actively exploited?

There is currently no confirmed evidence of active exploitation, but the potential impact warrants prompt remediation.

Where can I find the official Apache SeaTunnel advisory for CVE-2025-32896?

Refer to the Apache SeaTunnel project's security announcements for the official advisory: [https://seatunnel.apache.org/docs/security/](https://seatunnel.apache.org/docs/security/)

क्या आपका प्रोजेक्ट प्रभावित है?

अपनी डिपेंडेंसी फ़ाइल अपलोड करें और तुरंत जानें कि यह CVE और अन्य आपको प्रभावित करती हैं या नहीं।