Vulnerability Description
A user with a legitimate non-administrator account can exploit a vulnerability in the user ID creation mechanism in Apache StreamPipes that allows them to swap the username of an existing user with that of an administrator. This vulnerability allows an attacker to gain administrative control over the application by manipulating JWT tokens, which can lead to data tampering, unauthorized access and other security issues. This issue affects Apache StreamPipes: through 0.97.0. Users are recommended to upgrade to version 0.98.0, which fixes the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Streampipes | >= 0.69.0, < 0.98.0 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread/lngko4ht2ok3o0rk9h0clgm4kb0lmt36Mailing ListVendor Advisory
- http://www.openwall.com/lists/oss-security/2025/12/29/14Mailing ListThird Party Advisory
FAQ
What is CVE-2025-47411?
CVE-2025-47411 is a vulnerability with a CVSS score of 8.1 (HIGH). A user with a legitimate non-administrator account can exploit a vulnerability in the user ID creation mechanism in Apache StreamPipes that allows them to swap the username of an existing user with th...
How severe is CVE-2025-47411?
CVE-2025-47411 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-47411?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Streampipes.