CVE-2026-25903
Java vulnerability analysis and mitigation

Apache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configuration properties on extension components that have specific Required Permissions based on the Restricted annotation. The Restricted annotation indicates additional privileges required to add the annotated component to the flow configuration, but framework authorization did not check restricted status when updating a component previously added. The missing authorization requires a more privileged user to add a restricted component to the flow configuration, but permits a less privileged user to make property configuration changes. Apache NiFi installations that do not implement different levels of authorization for Restricted components are not subject to this vulnerability because the framework enforces write permissions as the security boundary. Upgrading to Apache NiFi 2.8.0 is the recommended mitigation.


SourceNVD

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-39842CRITICAL9.9
  • JavaJava
  • io.openremote:openremote-manager
NoYesApr 14, 2026
CVE-2026-2332HIGH7.4
  • JavaJava
  • jetty12
NoYesApr 14, 2026
CVE-2026-40104MEDIUM6.9
  • JavaJava
  • org.xwiki.platform:xwiki-platform-legacy-oldcore
NoYesApr 14, 2026
CVE-2026-40105MEDIUM6.5
  • JavaJava
  • org.xwiki.platform:xwiki-platform-web-templates
NoYesApr 14, 2026
CVE-2026-33929MEDIUM4.3
  • JavaJava
  • org.apache.pdfbox:pdfbox-examples
NoYesApr 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management