First published: Wed Mar 19 2025(Updated: )
Severity: medium (5.8) / important Server-Side Request Forgery (SSRF), Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'), URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Apache Druid. This issue affects all previous Druid versions. When using the Druid management proxy, a request that has a specially crafted URL could be used to redirect the request to an arbitrary server instead. This has the potential for XSS or XSRF. The user is required to be authenticated for this exploit. The management proxy is enabled in Druid's out-of-box configuration. It may be disabled to mitigate this vulnerability. If the management proxy is disabled, some web console features will not work properly, but core functionality is unaffected. Users are recommended to upgrade to Druid 31.0.2 or Druid 32.0.1, which fixes the issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Druid | <31.0.2 | |
maven/org.apache.druid:druid | =32.0.0 | 32.0.1 |
maven/org.apache.druid:druid | <31.0.2 | 31.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27888 has a medium severity rating of 5.8.
To fix CVE-2025-27888, upgrade to Apache Druid version 31.0.2 or later.
CVE-2025-27888 is associated with Server-Side Request Forgery (SSRF), improper input neutralization during web page generation, and open redirect vulnerabilities.
CVE-2025-27888 affects all versions of Apache Druid prior to version 31.0.2.
CVE-2025-27888 can potentially allow attackers to perform SSRF attacks and execute cross-site scripting attacks.