Apache Software Foundation Apache Nifi vulnerabilities

35 known vulnerabilities affecting apache_software_foundation/apache_nifi.

Total CVEs
35
CISA KEV
0
Public exploits
1
Exploited in wild
1
Severity breakdown
CRITICAL5HIGH12MEDIUM17LOW1

Vulnerabilities

Page 1 of 2
CVE-2026-25903HIGHCVSS 8.7≥ 1.1.0, < 2.8.02026-02-17
CVE-2026-25903 [HIGH] CWE-862 CVE-2026-25903: Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configuration properties on Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configuration properties on extension components that have specific Required Permissions based on the Restricted annotation. The Restricted annotation indicates additional privileges required to add the annotated component to the flow configuration, but framework authorization did
cvelistv5nvd
CVE-2025-66524HIGHCVSS 7.5≥ 1.20.0, ≤ 2.6.02025-12-19
CVE-2025-66524 [HIGH] CWE-502 CVE-2025-66524: Apache NiFi 1.20.0 through 2.6.0 include the GetAsanaObject Processor, which requires integration wi Apache NiFi 1.20.0 through 2.6.0 include the GetAsanaObject Processor, which requires integration with a configurable Distribute Map Cache Client Service for storing and retrieving state information. The GetAsanaObject Processor used generic Java Object serialization and deserialization without filtering. Unfiltered Java object deserialization does no
cvelistv5nvd
CVE-2025-27017MEDIUMCVSS 6.9≥ 1.13.0, ≤ 2.2.02025-03-12
CVE-2025-27017 [MEDIUM] CWE-538 CVE-2025-27017: Apache NiFi 1.13.0 through 2.2.0 includes the username and password used to authenticate with MongoD Apache NiFi 1.13.0 through 2.2.0 includes the username and password used to authenticate with MongoDB in the NiFi provenance events that MongoDB components generate during processing. An authorized user with read access to the provenance events of those processors may see the credentials information. Upgrading to Apache NiFi 2.3.0 is the recommended
cvelistv5nvd
CVE-2024-56512LOWCVSS 2.1PoC≥ 1.10.0, ≤ 2.0.02024-12-28
CVE-2024-56512 [LOW] CWE-638 CVE-2024-56512: Apache NiFi 1.10.0 through 2.0.0 are missing fine-grained authorization checking for Parameter Conte Apache NiFi 1.10.0 through 2.0.0 are missing fine-grained authorization checking for Parameter Contexts, referenced Controller Services, and referenced Parameter Providers, when creating new Process Groups. Creating a new Process Group can include binding to a Parameter Context, but in cases where the Process Group did not reference any Parameter valu
cvelistv5nvd
CVE-2024-52067MEDIUMCVSS 6.9≥ 1.16.0, ≤ 1.28.0≥ 2.0.0-M1, ≤ 2.0.0-M42024-11-21
CVE-2024-52067 [MEDIUM] CWE-532 CVE-2024-52067: Apache NiFi 1.16.0 through 1.28.0 and 2.0.0-M1 through 2.0.0-M4 include optional debug logging of Pa Apache NiFi 1.16.0 through 1.28.0 and 2.0.0-M1 through 2.0.0-M4 include optional debug logging of Parameter Context values during the flow synchronization process. An authorized administrator with access to change logging levels could enable debug logging for framework flow synchronization, causing the application to write Parameter names and values
cvelistv5nvd
CVE-2024-45477MEDIUMCVSS 4.6≥ 1.10.0, ≤ 1.27.0≥ 2.0.0-M1, ≤ 2.0.0-M32024-10-29
CVE-2024-45477 [MEDIUM] CWE-79 CVE-2024-45477: Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Para Apache NiFi 1.10.0 through 1.27.0 and 2.0.0-M1 through 2.0.0-M3 support a description field for Parameters in a Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session co
cvelistv5nvd
CVE-2024-37389MEDIUMCVSS 5.4≥ 1.10.0, ≤ 1.26.0≥ 2.0.0-M1, ≤ 2.0.0-M32024-07-08
CVE-2024-37389 [MEDIUM] CWE-79 CVE-2024-37389: Apache NiFi 1.10.0 through 1.26.0 and 2.0.0-M1 through 2.0.0-M3 support a description field in the P Apache NiFi 1.10.0 through 1.26.0 and 2.0.0-M1 through 2.0.0-M3 support a description field in the Parameter Context configuration that is vulnerable to cross-site scripting. An authenticated user, authorized to configure a Parameter Context, can enter arbitrary JavaScript code, which the client browser will execute within the session context of the
cvelistv5nvd
CVE-2023-49145MEDIUMCVSS 5.4≥ 0.7.0, ≤ 1.23.22023-11-27
CVE-2023-49145 [HIGH] CWE-79 CVE-2023-49145: Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then arbitrary JavaScript code can be executed within the se
cvelistv5nvd
CVE-2023-40037MEDIUMCVSS 6.5≥ 1.21.0, ≤ 1.23.02023-08-18
CVE-2023-40037 [MEDIUM] CWE-184 CVE-2023-40037: Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Control Apache NiFi 1.21.0 through 1.23.0 support JDBC and JNDI JMS access in several Processors and Controller Services with connection URL validation that does not provide sufficient protection against crafted inputs. An authenticated and authorized user can bypass connection URL validation using custom input formatting. The resolution enhances connection
cvelistv5nvd
CVE-2023-36542HIGHCVSS 8.8Exploited≥ 0.0.2, ≤ 1.22.02023-07-29
CVE-2023-36542 [HIGH] CWE-94 CVE-2023-36542: Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL re Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration
cvelistv5nvd
CVE-2023-34468HIGHCVSS 8.8≥ 0.0.2, ≤ 1.21.02023-06-12
CVE-2023-34468 [HIGH] CWE-94 CVE-2023-34468: The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1 The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.
cvelistv5nvd
CVE-2023-34212MEDIUMCVSS 6.5≥ 1.8.0, ≤ 1.21.02023-06-12
CVE-2023-34212 [MEDIUM] CWE-502 CVE-2023-34212: The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Pr The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location. The resolution validates the JNDI URL and restricts
cvelistv5nvd
CVE-2023-22832HIGHCVSS 7.5≥ 1.2.0, ≤ 1.19.12023-02-10
CVE-2023-22832 [HIGH] CWE-611 CVE-2023-22832: The ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML Extern The ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML External Entity references. Flow configurations that include the ExtractCCDAAttributes Processor are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Dec
cvelistv5nvd
CVE-2022-33140HIGHCVSS 8.8≥ up to 1.16.2, ≤ 1.16.2≥ 1.10.0, < 1.10.0*2022-06-15
CVE-2022-33140 [HIGH] CWE-78 CVE-2022-33140: The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 t The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellU
cvelistv5nvd
CVE-2022-29265HIGHCVSS 7.5≥ 0.0.1 to 1.16.0, ≤ 0.0.1 to 1.16.02022-04-30
CVE-2022-29265 [HIGH] CWE-611 CVE-2022-29265: Multiple components in Apache NiFi 0.0.1 to 1.16.0 do not restrict XML External Entity references in Multiple components in Apache NiFi 0.0.1 to 1.16.0 do not restrict XML External Entity references in the default configuration. The Standard Content Viewer service attempts to resolve XML External Entity references when viewing formatted XML files. The following Processors attempt to resolve XML External Entity references when configured with default
cvelistv5nvd
CVE-2022-26850MEDIUMCVSS 4.3vNiFi 1.14.0 to 1.15.32022-04-06
CVE-2022-26850 [MEDIUM] CWE-668 CVE-2022-26850: When creating or updating credentials for single-user access, Apache NiFi wrote a copy of the Login When creating or updating credentials for single-user access, Apache NiFi wrote a copy of the Login Identity Providers configuration to the operating system temporary directory. On most platforms, the operating system temporary directory has global read permissions. NiFi immediately moved the temporary file to the final configuration directory, which
cvelistv5nvd
CVE-2021-44145MEDIUMCVSS 6.5≥ Apache NiFi, ≤ 1.15.02021-12-17
CVE-2021-44145 [MEDIUM] CWE-200 CVE-2021-44145: In the TransformXML processor of Apache NiFi before 1.15.1 an authenticated user could configure an In the TransformXML processor of Apache NiFi before 1.15.1 an authenticated user could configure an XSLT file which, if it included malicious external entity calls, may reveal sensitive information.
cvelistv5nvd
CVE-2020-1928MEDIUMCVSS 5.3vApache NiFi 1.10.02020-01-28
CVE-2020-1928 [MEDIUM] CWE-532 CVE-2020-1928: An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter par An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present.
cvelistv5nvd
CVE-2020-1933MEDIUMCVSS 6.1vApache NiFi 1.0.0 to 1.10.02020-01-28
CVE-2020-1933 [MEDIUM] CWE-79 CVE-2020-1933: A XSS vulnerability was found in Apache NiFi 1.0.0 to 1.10.0. Malicious scripts could be injected to A XSS vulnerability was found in Apache NiFi 1.0.0 to 1.10.0. Malicious scripts could be injected to the UI through action by an unaware authenticated user in Firefox. Did not appear to occur in other browsers.
cvelistv5nvd
CVE-2018-17195HIGHCVSS 7.5vApache NiFi 1.0.0 - 1.7.12018-12-19
CVE-2018-17195 [HIGH] CWE-319 CVE-2018-17195: The template upload API endpoint accepted requests from different domain when sent in conjunction wi The template upload API endpoint accepted requests from different domain when sent in conjunction with ARP spoofing + man in the middle (MiTM) attack, resulting in a CSRF attack. The required attack vector is complex, requiring a scenario with client certificate authentication, same subnet access, and injecting malicious code into an unprotected (plai
cvelistv5nvd