CVE-2025-27888

Severity: medium (5.8) / important Server-Side Request Forgery (SSRF), Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'), URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Apache Druid. This issue affects all previous Druid versions. When using the Druid management proxy, a request that has a specially crafted URL could be used to redirect the request to an arbitrary server instead. This has the potential for XSS or XSRF. The user is required to be authenticated for this exploit. The management proxy is enabled in Druid's out-of-box configuration. It may be disabled to mitigate this vulnerability. If the management proxy is disabled, some web console features will not work properly, but core functionality is unaffected. Users are recommended to upgrade to Druid 31.0.2 or Druid 32.0.1, which fixes the issue.
References
Link Resource
https://lists.apache.org/thread/c0qo989pwtrqkjv6xfr0c30dnjq8vf39 Mailing List Vendor Advisory Issue Tracking
http://www.openwall.com/lists/oss-security/2025/03/19/7 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*

History

14 Jul 2025, 12:58

Type Values Removed Values Added
First Time Apache
Apache druid
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
Summary
  • (es) Gravedad: media (5.8) / importante Vulnerabilidad de Server-Side Request Forgery (SSRF), neutralización incorrecta de la entrada durante la generación de páginas web ("Cross-site Scripting") y redirección de URL a un sitio no confiable ("Open Redirect") en Apache Druid. Este problema afecta a todas las versiones anteriores de Druid. Al usar el proxy de administración de Druid, una solicitud con una URL especialmente manipulada podría usarse para redirigir la solicitud a un servidor arbitrario. Esto tiene el potencial de generar XSS o XSRF. El usuario debe estar autenticado para esta vulnerabilidad. El proxy de administración está habilitado en la configuración predeterminada de Druid. Se puede deshabilitar para mitigar esta vulnerabilidad. Si se deshabilita el proxy de administración, algunas funciones de la consola web no funcionarán correctamente, pero la funcionalidad principal no se verá afectada. Se recomienda a los usuarios actualizar a Druid 31.0.2 o Druid 32.0.1, que soluciona el problema.
CPE cpe:2.3:a:apache:druid:*:*:*:*:*:*:*:*
References () https://lists.apache.org/thread/c0qo989pwtrqkjv6xfr0c30dnjq8vf39 - () https://lists.apache.org/thread/c0qo989pwtrqkjv6xfr0c30dnjq8vf39 - Mailing List, Vendor Advisory, Issue Tracking
References () http://www.openwall.com/lists/oss-security/2025/03/19/7 - () http://www.openwall.com/lists/oss-security/2025/03/19/7 - Mailing List, Third Party Advisory

20 Mar 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-20 12:15

Updated : 2025-07-14 12:58


NVD link : CVE-2025-27888

Mitre link : CVE-2025-27888

CVE.ORG link : CVE-2025-27888


JSON object : View

Products Affected

apache

  • druid
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-601

URL Redirection to Untrusted Site ('Open Redirect')

CWE-918

Server-Side Request Forgery (SSRF)