Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62728: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Apache Software Foundation Apache Hive

0
Medium
VulnerabilityCVE-2025-62728cvecve-2025-62728cwe-89
Published: Wed Nov 26 2025 (11/26/2025, 08:45:37 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Hive

Description

SQL injection vulnerability in Hive Metastore Server (HMS) when processing delete column statistics requests via the Thrift APIs. The vulnerability is only exploitable by trusted/authorized users/applications that are allowed to call directly the Thrift APIs. In most real-world deployments, HMS is accessible to only a handful of applications (e.g., Hiveserver2) thus the vulnerability is not exploitable. Moreover, the vulnerable code cannot be reached when metastore.try.direct.sql property is set to false. This issue affects Apache Hive: from 4.1.0 before 4.2.0. Users are recommended to upgrade to version 4.2.0, which fixes the issue. Users who cannot upgrade directly are encouraged to set metastore.try.direct.sql property to false if the HMS Thrift APIs are exposed to general public.

AI-Powered Analysis

AILast updated: 12/03/2025, 09:18:23 UTC

Technical Analysis

CVE-2025-62728 is an SQL injection vulnerability identified in Apache Hive Metastore Server (HMS) versions from 4.1.0 up to but not including 4.2.0. The flaw exists in the handling of delete column statistics requests via the Thrift APIs, where improper neutralization of special SQL elements allows injection of malicious SQL commands. This vulnerability is classified under CWE-89, indicating improper input sanitization in SQL commands. Exploitation requires that the attacker be a trusted or authorized user or application with direct access to the HMS Thrift APIs, which in typical deployments are limited to a small set of internal services such as HiveServer2. The vulnerability is not exploitable if the configuration property metastore.try.direct.sql is set to false, as the vulnerable code path is bypassed. The Apache Software Foundation fixed this issue in version 4.2.0 of Apache Hive. The CVSS v3.1 base score is 5.4 (medium severity), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and limited impact on confidentiality and integrity but no impact on availability. No public exploits have been reported, and the vulnerability was published on November 26, 2025. The vulnerability primarily threatens the confidentiality and integrity of metadata stored in the Hive Metastore, potentially allowing attackers to manipulate or delete metadata entries via crafted SQL commands. Since HMS is a critical component in big data ecosystems, exploitation could disrupt data processing workflows or lead to unauthorized data modifications.

Potential Impact

For European organizations, the impact of CVE-2025-62728 depends largely on their deployment architecture of Apache Hive. Organizations using Hive for big data analytics, data warehousing, or ETL processes that expose HMS Thrift APIs beyond tightly controlled internal applications face a risk of unauthorized SQL injection attacks. Successful exploitation could lead to unauthorized modification or deletion of metadata, affecting data integrity and potentially causing downstream data processing errors or loss of trust in data accuracy. Confidentiality impact is limited but present, as attackers could infer or manipulate metadata. Availability is not directly impacted. Given the medium severity and the requirement for authenticated access, the threat is more relevant for organizations with complex or less restrictive internal network segmentation or those exposing HMS APIs to multiple applications or users. The risk is heightened in sectors with critical data processing needs such as finance, telecommunications, and research institutions prevalent in Europe. Additionally, regulatory frameworks like GDPR emphasize data integrity and protection, so metadata tampering could have compliance implications.

Mitigation Recommendations

European organizations should prioritize upgrading Apache Hive to version 4.2.0 or later, where the vulnerability is patched. If immediate upgrade is not feasible, they must ensure the metastore.try.direct.sql property is set to false to disable the vulnerable code path. Access controls should be strictly enforced to limit HMS Thrift API access only to trusted and authorized applications, ideally restricting network access via firewall rules and network segmentation. Implement monitoring and logging of HMS API calls to detect anomalous or unauthorized requests. Conduct regular security audits of big data infrastructure to verify configuration compliance and access policies. Employ application-layer firewalls or API gateways where possible to add an additional layer of input validation and request filtering. Educate administrators and developers on secure configuration practices for Apache Hive and the risks of exposing internal APIs. Finally, integrate vulnerability management processes to promptly apply patches and configuration updates upon disclosure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-10-21T07:37:11.650Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6926bfc71118926627fad662

Added to database: 11/26/2025, 8:52:23 AM

Last enriched: 12/3/2025, 9:18:23 AM

Last updated: 1/10/2026, 10:15:06 PM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats