Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29847: CWE-20 Improper Input Validation in Apache Software Foundation Apache Linkis

0
High
VulnerabilityCVE-2025-29847cvecve-2025-29847cwe-20cwe-22
Published: Mon Jan 19 2026 (01/19/2026, 08:36:06 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Linkis

Description

CVE-2025-29847 is a high-severity vulnerability in Apache Linkis versions 1. 3. 0 through 1. 7. 0 involving improper input validation of URL parameters in the JDBC engine and data source functionality. Multiple rounds of URL encoding can bypass system checks, enabling unauthorized access to system files via JDBC parameters without authentication or user interaction. The vulnerability impacts confidentiality but not integrity or availability. Apache has fixed the issue in version 1. 8. 0 by ensuring continuous URL decoding of connection information containing '%' characters.

AI-Powered Analysis

AILast updated: 01/26/2026, 20:08:14 UTC

Technical Analysis

CVE-2025-29847 is a vulnerability in Apache Linkis, an open-source data integration and governance platform widely used for big data analytics. The flaw exists in the JDBC engine and data source functionality, where the URL parameter on the frontend can be subjected to multiple rounds of URL encoding. This improper input validation (CWE-20) allows attackers to bypass the system's security checks by encoding the URL multiple times, which the system fails to decode properly before processing. As a result, attackers can craft malicious JDBC parameters that grant unauthorized access to system files, potentially exposing sensitive data. The vulnerability affects Apache Linkis versions 1.3.0 through 1.7.0. The issue stems from insufficient sanitization and decoding of connection strings containing the '%' character, which is used in URL encoding. The Apache Software Foundation addressed this by implementing continuous URL decoding checks and released a patched version 1.8.0. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity due to its network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on confidentiality. There are no known exploits in the wild at this time, but the potential for unauthorized file access makes this a significant risk for affected deployments.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data managed or processed via Apache Linkis, particularly in sectors relying heavily on big data analytics such as finance, telecommunications, healthcare, and government. Unauthorized access to system files could lead to data breaches, exposure of intellectual property, or leakage of personally identifiable information (PII), potentially violating GDPR and other data protection regulations. The vulnerability does not affect system integrity or availability directly but could be leveraged as a foothold for further attacks. Organizations using affected versions in production environments may face compliance risks, reputational damage, and operational disruptions if exploited. Since exploitation requires no authentication and can be performed remotely over the network, the threat surface is broad. European entities with complex data pipelines integrating multiple data sources via Apache Linkis should prioritize remediation to prevent unauthorized data disclosure.

Mitigation Recommendations

1. Upgrade Apache Linkis to version 1.8.0 or later, where the vulnerability is fully patched. 2. In environments where immediate upgrade is not feasible, implement strict input validation and sanitization on all frontend URL parameters, ensuring that multiple URL encodings are properly decoded and checked before processing. 3. Restrict network access to the Apache Linkis JDBC engine to trusted internal networks or via VPN to reduce exposure. 4. Monitor logs for unusual JDBC connection attempts or malformed URL parameters indicative of exploitation attempts. 5. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious URL encoding patterns targeting the JDBC parameters. 6. Conduct regular security audits and penetration testing focused on data source integrations to identify similar input validation weaknesses. 7. Educate development and operations teams about secure coding practices related to input validation and URL encoding/decoding processes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-03-12T03:28:05.936Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696df1ced302b072d99017b2

Added to database: 1/19/2026, 8:56:46 AM

Last enriched: 1/26/2026, 8:08:14 PM

Last updated: 2/7/2026, 2:02:12 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats