Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60012: CWE-20 Improper Input Validation in Apache Software Foundation Apache Livy

0
Unknown
VulnerabilityCVE-2025-60012cvecve-2025-60012cwe-20
Published: Fri Mar 13 2026 (03/13/2026, 15:23:07 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Livy

Description

Malicious configuration can lead to unauthorized file access in Apache Livy. This issue affects Apache Livy 0.7.0 and 0.8.0 when connecting to Apache Spark 3.1 or later. A request that includes a Spark configuration value supported from Apache Spark version 3.1 can lead to users gaining access to files they do not have permissions to. For the vulnerability to be exploitable, the user needs to have access to Apache Livy's REST or JDBC interface and be able to send requests with arbitrary Spark configuration values. Users are recommended to upgrade to version 0.9.0 or later, which fixes the issue.

AI-Powered Analysis

AILast updated: 03/13/2026, 15:44:50 UTC

Technical Analysis

CVE-2025-60012 is a security vulnerability classified under CWE-20 (Improper Input Validation) affecting Apache Livy versions 0.7.0 and 0.8.0 when used in conjunction with Apache Spark version 3.1 or later. Apache Livy is a service that enables interaction with Apache Spark through REST and JDBC interfaces. The vulnerability stems from Livy accepting Spark configuration values from user requests without sufficient validation. Since Spark 3.1 introduced new configuration parameters, Livy’s failure to properly validate these inputs allows an attacker with access to Livy's REST or JDBC endpoints to supply malicious configuration values. These crafted values can cause Livy to access files on the server that the attacker is not authorized to read, leading to unauthorized file disclosure. The attack surface is limited to users who already have access to Livy's interfaces, but within that scope, the vulnerability can lead to significant confidentiality breaches. The issue has been addressed in Apache Livy 0.9.0 by implementing stricter validation and sanitization of Spark configuration inputs. No CVSS score has been assigned yet, and no public exploits have been observed. However, the vulnerability represents a serious risk to environments running vulnerable Livy versions connected to Spark 3.1 or newer.

Potential Impact

The primary impact of CVE-2025-60012 is unauthorized disclosure of sensitive files on servers running vulnerable Apache Livy versions. This can lead to exposure of confidential data, including credentials, configuration files, or other sensitive information stored on the server. Organizations relying on Apache Livy for Spark job submissions and management could face data breaches if attackers exploit this flaw. Since the vulnerability requires access to Livy’s REST or JDBC interfaces, the risk is higher in environments where these interfaces are exposed to untrusted networks or insufficiently restricted users. The breach of confidentiality could facilitate further attacks, including privilege escalation or lateral movement within the network. Additionally, unauthorized file access could violate compliance requirements and damage organizational reputation. The scope is limited to Livy instances connected to Spark 3.1 or later, but given the widespread adoption of Spark in big data environments, many organizations worldwide could be affected. The absence of known exploits reduces immediate risk, but the vulnerability should be treated as high priority due to the sensitive nature of data potentially exposed.

Mitigation Recommendations

To mitigate CVE-2025-60012, organizations should upgrade Apache Livy to version 0.9.0 or later, where the vulnerability is fixed. Until upgrade is possible, restrict access to Livy’s REST and JDBC interfaces to trusted users and networks only, using network segmentation, firewalls, and access controls. Implement strict authentication and authorization mechanisms to limit who can send Spark configuration parameters through Livy. Monitor Livy logs for unusual or unexpected configuration parameters in requests. Consider deploying Web Application Firewalls (WAFs) or API gateways that can detect and block suspicious payloads targeting configuration inputs. Regularly audit and review user permissions and interface exposure to minimize the attack surface. Additionally, ensure that sensitive files on the server have appropriate filesystem permissions to reduce the impact of unauthorized access. Finally, keep abreast of updates from Apache and apply security patches promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-09-23T19:07:43.584Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b42da82f860ef943f7d5fb

Added to database: 3/13/2026, 3:30:48 PM

Last enriched: 3/13/2026, 3:44:50 PM

Last updated: 3/13/2026, 5:56:59 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses