CVE-2025-54981
- EPSS 0.02%
- Veröffentlicht 12.12.2025 15:15:53
- Zuletzt bearbeitet 15.12.2025 17:19:19
Weak Encryption Algorithm in StreamPark, The use of an AES cipher in ECB mode and a weak random number generator for encrypting sensitive data, including JWT tokens, may have risked exposing sensitive authentication data This issue affects Apache St...
CVE-2025-54947
- EPSS 0.05%
- Veröffentlicht 12.12.2025 15:15:53
- Zuletzt bearbeitet 15.12.2025 17:20:46
In Apache StreamPark versions 2.0.0 through 2.1.7, a security vulnerability involving a hard-coded encryption key exists. This vulnerability occurs because the system uses a fixed, immutable key for encryption instead of dynamically generating or sec...
CVE-2025-53960
- EPSS 0.07%
- Veröffentlicht 12.12.2025 15:15:49
- Zuletzt bearbeitet 16.12.2025 21:28:34
When issuing JSON Web Tokens (JWT), Apache StreamPark directly uses the user's password as the HMAC signing key (e.g., with the HS256 algorithm). An attacker can exploit this vulnerability to perform offline brute-force attacks on the user's password...
CVE-2025-30001
- EPSS 0.09%
- Veröffentlicht 10.10.2025 09:52:26
- Zuletzt bearbeitet 04.11.2025 22:16:09
Incorrect Execution-Assigned Permissions vulnerability in Apache StreamPark. This issue affects Apache StreamPark: from 2.1.4 before 2.1.6. Users are recommended to upgrade to version 2.1.6, which fixes the issue.
CVE-2024-48988
- EPSS 0.03%
- Veröffentlicht 22.08.2025 18:24:22
- Zuletzt bearbeitet 04.11.2025 22:16:04
SQL Injection vulnerability in Apache StreamPark. This issue affects Apache StreamPark: from 2.1.4 before 2.1.6. Users are recommended to upgrade to version 2.1.6, which fixes the issue. This vulnerability is present only in the distribution pack...
CVE-2024-29070
- EPSS 0.16%
- Veröffentlicht 23.07.2024 09:15:02
- Zuletzt bearbeitet 10.07.2025 18:24:57
On versions before 2.1.4, session is not invalidated after logout. When the user logged in successfully, the Backend service returns "Authorization" as the front-end authentication credential. "Authorization" can still initiate requests and access da...
CVE-2024-34457
- EPSS 0.2%
- Veröffentlicht 22.07.2024 10:15:03
- Zuletzt bearbeitet 21.11.2024 09:18:43
On versions before 2.1.4, after a regular user successfully logs in, they can manually make a request using the authorization token to view everyone's user flink information, including executeSQL and config. Mitigation: all users should upgrade to ...
CVE-2024-29178
- EPSS 12.02%
- Veröffentlicht 18.07.2024 12:15:02
- Zuletzt bearbeitet 13.02.2025 18:17:50
On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability...
CVE-2024-29120
- EPSS 0.08%
- Veröffentlicht 17.07.2024 15:15:14
- Zuletzt bearbeitet 23.06.2025 18:09:18
In Streampark (version < 2.1.4), when a user logged in successfully, the Backend service would return "Authorization" as the front-end authentication credential. User can use this credential to request other users' information, including the adminis...
CVE-2024-29737
- EPSS 0.81%
- Veröffentlicht 17.07.2024 09:15:02
- Zuletzt bearbeitet 13.02.2025 18:17:50
In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user...