First published: Tue Mar 11 2025(Updated: )
Apache NiFi 1.13.0 through 2.2.0 includes the username and password used to authenticate with MongoDB in the NiFi provenance events that MongoDB components generate during processing. An authorized user with read access to the provenance events of those processors may see the credentials information. Upgrading to Apache NiFi 2.3.0 is the recommended mitigation, which removes the credentials from provenance event records.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache NiFi | >=1.13.0<=2.2.0 | |
maven/org.apache.nifi:nifi-mongodb-services | >=1.13.0<2.3.0 | 2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-27017 is considered high due to the exposure of sensitive MongoDB credentials.
To fix CVE-2025-27017, upgrade to Apache NiFi version 2.3.0 or later.
Apache NiFi versions from 1.13.0 to 2.2.0 are affected by CVE-2025-27017.
CVE-2025-27017 requires authorized user access to provenance events, so unauthorized users cannot exploit it directly.
CVE-2025-27017 exposes MongoDB usernames and passwords within NiFi provenance events.