Apache Spark vulnerabilities

21 known vulnerabilities affecting apache/spark.

Total CVEs
21
CISA KEV
1
actively exploited
Public exploits
3
Exploited in wild
2
Severity breakdown
CRITICAL3HIGH8MEDIUM10

Vulnerabilities

Page 1 of 2
CVE-2025-54920HIGHCVSS 8.8fixed in 3.5.7v4.0.0+1 more2026-03-16
CVE-2025-54920 [HIGH] CWE-502 CVE-2025-54920: This issue affects Apache Spark: before 3.5.7 and 4.0.1. Users are recommended to upgrade to version This issue affects Apache Spark: before 3.5.7 and 4.0.1. Users are recommended to upgrade to version 3.5.7 or 4.0.1 and above, which fixes the issue. Summary Apache Spark 3.5.4 and earlier versions contain a code execution vulnerability in the Spark History Web UI due to overly permissive Jackson deserialization of event log data. This allows an at
nvd
CVE-2025-55039MEDIUMCVSS 6.5fixed in 3.4.4≥ 3.5.0, < 3.5.22025-10-15
CVE-2025-55039 [MEDIUM] CWE-326 CVE-2025-55039: This issue affects Apache Spark versions before 3.4.4, 3.5.2 and 4.0.0. Apache Spark versions be This issue affects Apache Spark versions before 3.4.4, 3.5.2 and 4.0.0. Apache Spark versions before 4.0.0, 3.5.2 and 3.4.4 use an insecure default network encryption cipher for RPC communication between nodes. When spark.network.crypto.enabled is set to true (it is set to false by default), but spark.network.crypto.cipher is not explicitly confi
nvd
CVE-2024-23945MEDIUMCVSS 5.9≥ 2.0.0, < 3.3.4≥ 3.4.0, < 3.4.2+1 more2024-12-23
CVE-2024-23945 [MEDIUM] CWE-209 CVE-2024-23945: Signing cookies is an application security feature that adds a digital signature to cookie data to v Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service component accidentally exposes the signed cookie to
nvd
CVE-2023-32007HIGHCVSS 8.8≤ 3.0.3≥ 3.1.1, ≤ 3.1.3+1 more2023-05-02
CVE-2023-32007 [HIGH] CVE-2023-32007: ** UNSUPPORTED WHEN ASSIGNED ** The Apache Spark UI offers the possibility to enable ACLs via the co ** UNSUPPORTED WHEN ASSIGNED ** The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by provid
nvd
CVE-2023-22946CRITICALCVSS 9.9fixed in 3.4.02023-04-17
CVE-2023-22946 [MEDIUM] CWE-269 CVE-2023-22946: In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-related classes on the classpath. This affects architectures relying on proxy-user, for example t
nvd
CVE-2022-31777MEDIUMCVSS 5.4fixed in 3.2.2v3.3.02022-11-01
CVE-2022-31777 [MEDIUM] CWE-74 CVE-2022-31777: A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allo A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be returned in logs rendered in the UI.
nvd
CVE-2022-33891HIGHCVSS 8.8KEVPoC≤ 3.0.3≥ 3.1.1, ≤ 3.1.2+1 more2022-07-18
CVE-2022-33891 [HIGH] CWE-78 CVE-2022-33891: The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.en The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user nam
nvd
CVE-2021-38296HIGHCVSS 7.5fixed in 3.1.32022-03-10
CVE-2021-38296 [HIGH] CWE-294 CVE-2021-38296: Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.n Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Not
nvd
CVE-2020-27223MEDIUMCVSS 5.3v3.1.12021-02-26
CVE-2020-27223 [MEDIUM] CWE-407 CVE-2020-27223: In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty hand In Eclipse Jetty 9.4.6.v20170531 to 9.4.36.v20210114 (inclusive), 10.0.0, and 11.0.0 when Jetty handles a request containing multiple Accept headers with a large number of “quality” (i.e. q) parameters, the server may enter a denial of service (DoS) state due to high CPU usage processing those quality values, resulting in minutes of CPU time exhaust
nvd
CVE-2020-27218MEDIUMCVSS 4.8v2.4.8v3.0.32020-11-28
CVE-2020-27218 [MEDIUM] CWE-226 CVE-2020-27218: In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.al In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the applicati
nvd
CVE-2020-9480CRITICALCVSS 9.8ExploitedPoC≤ 2.4.52020-06-23
CVE-2020-9480 [CRITICAL] CWE-306 CVE-2020-9480: In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to requi In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to exe
nvd
CVE-2019-20445CRITICALCVSS 9.1v2.4.7v2.4.82020-01-29
CVE-2019-20445 [CRITICAL] CWE-444 CVE-2019-20445: HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.
nvd
CVE-2019-10172HIGHCVSS 7.5v3.0.12019-11-18
CVE-2019-10172 [HIGH] CVE-2019-10172: A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vul A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.
nvd
CVE-2019-10099HIGHCVSS 7.5≥ 1.0.2, ≤ 1.6.3≥ 2.0.0, ≤ 2.0.2+3 more2019-08-07
CVE-2019-10099 [HIGH] CWE-312 CVE-2019-10099: Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, e Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs.
nvd
CVE-2018-11760MEDIUMCVSS 5.5≥ 1.0.2, ≤ 1.6.3≥ 2.0.0, ≤ 2.0.2+3 more2019-02-04
CVE-2018-11760 [MEDIUM] CVE-2018-11760: When using PySpark , it's possible for a different local user to connect to the Spark application an When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.
nvd
CVE-2018-11804HIGHCVSS 7.5≥ 1.3.0, < 2.2.3≥ 2.3.0, < 2.3.32018-10-24
CVE-2018-11804 [HIGH] CVE-2018-11804: Spark's Apache Maven-based build includes a convenience script, 'build/mvn', that downloads and runs Spark's Apache Maven-based build includes a convenience script, 'build/mvn', that downloads and runs a zinc server to speed up compilation. It has been included in release branches since 1.3.x, up to and including master. This server will accept connections from external hosts by default. A specially-crafted request to the zinc server could cause it to reveal
nvd
CVE-2018-11770MEDIUMCVSS 4.2≥ 1.3.0, < 2.4.02018-08-13
CVE-2018-11770 [MEDIUM] CWE-287 CVE-2018-11770: From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, i From version 1.3.0 onward, Apache Spark's standalone master exposes a REST API for job submission, in addition to the submission mechanism used by spark-submit. In standalone, the config property 'spark.authenticate.secret' establishes a shared secret for authenticating requests to submit jobs via spark-submit. However, the REST API does not use thi
nvd
CVE-2018-8024MEDIUMCVSS 5.4PoC≥ 2.1.0, ≤ 2.1.2≥ 2.2.0, ≤ 2.2.1+1 more2018-07-12
CVE-2018-8024 [MEDIUM] CWE-200 CVE-2018-8024: In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to con In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the user's view of the Spark UI. While some browsers like r
nvd
CVE-2018-1334MEDIUMCVSS 4.7≤ 2.1.2≥ 2.2.0, ≤ 2.2.1+1 more2018-07-12
CVE-2018-1334 [MEDIUM] CWE-200 CVE-2018-1334: In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possib In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application.
nvd
CVE-2017-12612HIGHCVSS 7.8v1.6.0v1.6.1+7 more2017-09-13
CVE-2017-12612 [HIGH] CWE-502 CVE-2017-12612: In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local machine. It does not affect apps run by spark-submit
nvd