CVE-2025-27888
Java vulnerability analysis and mitigation

Overview

A security vulnerability identified as CVE-2025-27888 was discovered in Apache Druid, affecting all versions prior to 31.0.2 and 32.0.1. The vulnerability combines Server-Side Request Forgery (SSRF), Cross-Site Scripting (XSS), and URL Redirection to Untrusted Site (Open Redirect) issues. The flaw was disclosed on March 19, 2025, and received a CVSS v4.0 score of 5.8 (Medium severity) (NVD, Security Online).

Technical details

The vulnerability exists in the Druid management proxy functionality, which is enabled by default in the out-of-box configuration. When using the management proxy, a specially crafted URL can be manipulated to redirect requests to arbitrary servers. The vulnerability requires authentication for exploitation, but due to its default enabled state in the configuration, it poses a significant risk. The issue has been assigned a CVSS v4.0 Base Score of 5.8 (Medium) with the vector string CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:L/VA:N/SC:L/SI:L/SA:N (NVD, Openwall).

Impact

The vulnerability can lead to multiple security implications including redirection to malicious websites, potential token theft, and cross-site request forgery (XSRF) attacks. Organizations with multi-user environments or external access to the Druid UI are particularly at risk, as authenticated attackers could exploit this flaw to redirect users to phishing pages or inject malicious scripts (Security Online).

Mitigation and workarounds

Users are strongly recommended to upgrade to either Apache Druid version 31.0.2 or 32.0.1, which contain fixes for this vulnerability. As a temporary workaround, the management proxy can be disabled, though this will impact some web console features while maintaining core functionality. Organizations should carefully evaluate their deployment configurations and implement the necessary updates to ensure system security (Openwall, Security Online).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66516CRITICAL10
  • JavaJava
  • tika
NoYesDec 04, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • org.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
CVE-2025-11222MEDIUM6.1
  • JavaJava
  • com.linecorp.centraldogma:centraldogma-server-auth-shiro
NoYesDec 04, 2025
CVE-2025-66453MEDIUM5.5
  • JavaJava
  • org.mozilla:rhino
NoYesDec 03, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management