Skip to main content
Mallory

Apache NiFi Authorization Bypass in Restricted Component Updates (CVE-2026-25903)

identity-authentication-vulnerabilitywidely-deployed-product-advisoryopen-source-dependency-vulnerability
Updated March 21, 2026 at 02:31 PM2 sources
Share:
Apache NiFi Authorization Bypass in Restricted Component Updates (CVE-2026-25903)

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Apache NiFi disclosed a high-severity authorization flaw, tracked as CVE-2026-25903, that allows a lower-privileged user to modify configuration properties of Restricted extension components after they have been added to a flow by a more privileged user. The issue affects NiFi versions 1.1.0 through 2.7.2 and stems from missing authorization checks during component property updates: the framework enforced the extra privileges required to add a Restricted component, but did not consistently re-check the component’s restricted status when updating it, enabling an authorization bypass (CWE-862). Potential impact includes tampering with dataflow logic and, depending on the component and environment, enabling unsafe actions such as triggering sensitive operations or altering processing behavior.

Risk is conditional on deployments that implement distinct authorization levels for Restricted components; installations that do not differentiate authorization levels are described as not subject to this specific bypass because standard write permissions remain the effective security boundary. Upgrading to NiFi 2.8.0 is the recommended mitigation, and the issue was reported via responsible disclosure (credited to David Handermann in reporting). CVE records also reference public advisories and include a CVSS v4.0 vector indicating network reachability and high potential impact, while noting prerequisites such as the need for a privileged user to have already introduced the Restricted component into the flow.

Timeline

  1. Feb 17, 2026

    Apache NiFi 2.8.0 released to fix authorization bypass flaw

    Apache identified Apache NiFi 2.8.0 as the fixed version for CVE-2026-25903 and advised users to upgrade. The remediation closes the gap where restricted-status permissions were enforced during component addition but not during later updates.

  2. Feb 17, 2026

    Apache discloses CVE-2026-25903 in Apache NiFi

    Apache NiFi disclosed CVE-2026-25903, a missing authorization check flaw that lets lower-privileged users modify configuration properties of previously added Restricted components. The issue affects NiFi versions 1.1.0 through 2.7.2 and can enable unauthorized workflow or command-related changes depending on deployment permissions.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

Related Stories

Critical n8n Expression Sandbox Escape Leading to Authenticated RCE (CVE-2026-25049)

Critical n8n Expression Sandbox Escape Leading to Authenticated RCE (CVE-2026-25049)

A **critical remote code execution** issue in the *n8n* open-source workflow automation platform, tracked as **CVE-2026-25049** (also published as **GHSA-6cqr-8cfr-67f8**), allows an **authenticated** user with permission to create or modify workflows to escape n8n’s expression sandbox and execute arbitrary system commands on the underlying host. The flaw stems from **insufficient input sanitization/weak sandboxing** in n8n’s expression evaluation (server-side JavaScript) and was identified during follow-up analysis after an earlier critical n8n vulnerability (**CVE-2025-68613**) was patched; researchers report the new issue effectively **bypasses prior mitigations**. Reporting indicates exploitation can lead to **full compromise** of the n8n instance, including access to the filesystem and the ability to **steal stored credentials and secrets** (e.g., API keys, OAuth tokens) and sensitive configuration, with potential for **pivoting** into connected internal services and cloud accounts in multi-tenant deployments. Public reporting also notes **public exploits** are available. n8n maintainers state the issue is patched, and affected organizations should upgrade to fixed releases (**1.123.17** and **2.5.2**), as versions **prior to 1.123.17 and 2.5.2** are impacted.

1 months ago
Critical MLflow Vulnerabilities Enable Authentication Bypass and RCE

Critical MLflow Vulnerabilities Enable Authentication Bypass and RCE

**MLflow** disclosed and patched multiple high-severity vulnerabilities affecting deployments of the MLflow platform, including an **authentication bypass due to default credentials** in `basic_auth.ini` tracked as **CVE-2026-2635** (ZDI-26-111). The issue allows **unauthenticated remote attackers** to bypass authentication and potentially **execute arbitrary code with administrator context**; ZDI scored it **CVSS 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)** and credited the finding to **Peter Girnus (@gothburz)** via Trend Micro’s **Zero Day Initiative (ZDI)**. A separate MLflow Tracking Server flaw, **CVE-2026-2033**, enables **directory traversal leading to remote code execution** via improper validation of user-supplied artifact file paths in the artifact handler. Exploitation requires no authentication and can result in code execution in the context of the MLflow service account. Both issues reference the same upstream remediation in MLflow (`https://github.com/mlflow/mlflow/pull/19260`) and were published through ZDI advisories (including **ZDI-26-111** for CVE-2026-2635 and **ZDI-26-105** for CVE-2026-2033), indicating coordinated fixes are available and should be prioritized for exposed MLflow instances.

1 months ago
Privilege Escalation Vulnerability in Apache StreamPipes (CVE-2025-47411)

Privilege Escalation Vulnerability in Apache StreamPipes (CVE-2025-47411)

A critical privilege escalation vulnerability, tracked as CVE-2025-47411, was discovered in Apache StreamPipes versions 0.69.0 through 0.97.0. The flaw allows legitimate non-administrator users to manipulate JWT tokens and escalate their privileges by swapping their username for an existing administrator account, thereby gaining full administrative control of the application. This vulnerability stems from a flawed user ID creation mechanism and poses significant risks, as attackers can bypass access controls without advanced technical skills or external tools. Once administrative access is obtained, attackers can access sensitive data, modify system configurations, and potentially compromise the entire data streaming infrastructure. The vulnerability is particularly concerning for organizations using StreamPipes to process proprietary or operational data, and it introduces supply chain risks if integrated with critical business systems. Apache has addressed the issue by releasing version 0.98.0, urging all affected users to update immediately to mitigate the risk.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Apache NiFi Authorization Bypass in Restricted Component Updates (CVE-2026-25903) | Mallory