CVE-2025-47411

HIGH8.1/ 10.0
Share:
Published: January 1, 2026 at 05:15 PM
Modified: January 6, 2026 at 02:40 PM
Source: security@apache.org

Vulnerability Description

A user with a legitimate non-administrator account can exploit a vulnerability in the user ID creation mechanism in Apache StreamPipes that allows them to swap the username of an existing user with that of an administrator.  This vulnerability allows an attacker to gain administrative control over the application by manipulating JWT tokens, which can lead to data tampering, unauthorized access and other security issues. This issue affects Apache StreamPipes: through 0.97.0. Users are recommended to upgrade to version 0.98.0, which fixes the issue.

CVSS Metrics

Base Score
8.1
Severity
HIGH
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Weaknesses (CWE)

Source: security@apache.org

AI Security Analysis

01 // Technical Summary

Apache StreamPipes versions up to 0.97.0 are vulnerable to a critical flaw allowing a standard user to elevate their privileges to administrator. This vulnerability, stemming from a flawed user ID creation process, enables attackers to hijack administrator accounts and gain complete control over the application, leading to data breaches and system compromise.

02 // Vulnerability Mechanism

Step 1: Account Creation/Modification: The attacker creates a legitimate, non-administrator account or modifies an existing one. This account will be used to exploit the vulnerability.

Step 2: User ID Manipulation: The attacker identifies the administrator's user ID (e.g., through information disclosure or brute-forcing). They then craft a request to the server that attempts to associate the administrator's user ID with their own account.

Step 3: JWT Token Generation: The attacker triggers the generation of a new JWT token, likely by logging in or requesting a token refresh. The server, due to the vulnerability, issues a token associated with the administrator's user ID, but now linked to the attacker's account.

Step 4: Privilege Escalation: The attacker uses the newly generated JWT token, which now has administrator privileges, to access restricted functionalities and control the application.

03 // Deep Technical Analysis

The vulnerability lies within the user ID creation and authentication mechanism of Apache StreamPipes. The root cause is a flaw in how the system handles user ID assignments and JWT token generation. Specifically, the system fails to properly validate the user ID during the account creation or update process. An attacker can manipulate the process to swap their user ID with that of an existing administrator. This likely involves a race condition or a lack of proper authorization checks when updating user profiles. The application then trusts the manipulated JWT tokens, granting the attacker administrator privileges. The lack of proper input validation and authorization checks allows for the privilege escalation.

CVE-2025-47411 - HIGH Severity (8.1) | Free CVE Database | 4nuxd