Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.apache.nifi/nifi@1.16.2 |
| Type | maven |
| Namespace | org.apache.nifi |
| Name | nifi |
| Version | 1.16.2 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 1.24.0 |
| Latest_non_vulnerable_version | 1.24.0 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-3eka-p4cs-f3dz |
| vulnerability_id |
VCID-3eka-p4cs-f3dz |
| summary |
Apache NiFi vulnerable to Code Injection
The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.
The resolution validates the Database URL and rejects H2 JDBC locations.
You are recommended to upgrade to version 1.22.0 or later which fixes this issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34468 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.77205 |
| scoring_system |
epss |
| scoring_elements |
0.98975 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.77205 |
| scoring_system |
epss |
| scoring_elements |
0.98965 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.77205 |
| scoring_system |
epss |
| scoring_elements |
0.98967 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.77205 |
| scoring_system |
epss |
| scoring_elements |
0.98969 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.77205 |
| scoring_system |
epss |
| scoring_elements |
0.98971 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.77205 |
| scoring_system |
epss |
| scoring_elements |
0.98972 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.77205 |
| scoring_system |
epss |
| scoring_elements |
0.98973 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.77205 |
| scoring_system |
epss |
| scoring_elements |
0.98974 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34468 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-34468, GHSA-xm2m-2q6h-22jw
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3eka-p4cs-f3dz |
|
| 1 |
| url |
VCID-4uja-72yx-6qdc |
| vulnerability_id |
VCID-4uja-72yx-6qdc |
| summary |
Deserialization of Untrusted Data
The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location.
The resolution validates the JNDI URL and restricts locations to a set of allowed schemes.
You are recommended to upgrade to version 1.22.0 or later which fixes this issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34212 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00779 |
| scoring_system |
epss |
| scoring_elements |
0.73667 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.00779 |
| scoring_system |
epss |
| scoring_elements |
0.73654 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00779 |
| scoring_system |
epss |
| scoring_elements |
0.73716 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00779 |
| scoring_system |
epss |
| scoring_elements |
0.73707 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00779 |
| scoring_system |
epss |
| scoring_elements |
0.73663 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00779 |
| scoring_system |
epss |
| scoring_elements |
0.73672 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00779 |
| scoring_system |
epss |
| scoring_elements |
0.73689 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00909 |
| scoring_system |
epss |
| scoring_elements |
0.75748 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00909 |
| scoring_system |
epss |
| scoring_elements |
0.75759 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00909 |
| scoring_system |
epss |
| scoring_elements |
0.7578 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34212 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-34212, GHSA-65wh-g8x8-gm2h
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4uja-72yx-6qdc |
|
| 2 |
| url |
VCID-g74u-zmqj-gyb7 |
| vulnerability_id |
VCID-g74u-zmqj-gyb7 |
| summary |
XML External Entity Reference in Apache NiFi
The ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML External Entity references. Flow configurations that include the ExtractCCDAAttributes Processor are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations and disallows XML External Entity resolution in the ExtractCCDAAttributes Processor. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22832 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02041 |
| scoring_system |
epss |
| scoring_elements |
0.83867 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02041 |
| scoring_system |
epss |
| scoring_elements |
0.83783 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.02041 |
| scoring_system |
epss |
| scoring_elements |
0.83797 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.02041 |
| scoring_system |
epss |
| scoring_elements |
0.83798 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.02041 |
| scoring_system |
epss |
| scoring_elements |
0.83822 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.02041 |
| scoring_system |
epss |
| scoring_elements |
0.83828 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02041 |
| scoring_system |
epss |
| scoring_elements |
0.83844 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02041 |
| scoring_system |
epss |
| scoring_elements |
0.83837 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02041 |
| scoring_system |
epss |
| scoring_elements |
0.83833 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-22832 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-22832, GHSA-hxjp-q6c3-38fx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g74u-zmqj-gyb7 |
|
| 3 |
| url |
VCID-hy35-v2p5-2ycq |
| vulnerability_id |
VCID-hy35-v2p5-2ycq |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then arbitrary
JavaScript code can be executed within the session context of the authenticated user. Upgrading to Apache NiFi 1.24.0 or 2.0.0-M1 is the recommended mitigation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49145 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52552 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52656 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52649 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.5261 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52625 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52642 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52591 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52578 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52597 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-49145 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-49145, GHSA-68pr-6fjc-wmgm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hy35-v2p5-2ycq |
|
| 4 |
| url |
VCID-rv8f-q4a4-xqbk |
| vulnerability_id |
VCID-rv8f-q4a4-xqbk |
| summary |
Apache NiFi Code Injection vulnerability
Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-36542 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76419 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76515 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76479 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76501 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76475 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76461 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76429 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76448 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0096 |
| scoring_system |
epss |
| scoring_elements |
0.76519 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-36542 |
|
| 1 |
| reference_url |
http://seclists.org/fulldisclosure/2023/Jul/43 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T13:50:05Z/ |
|
|
| url |
http://seclists.org/fulldisclosure/2023/Jul/43 |
|
| 2 |
| reference_url |
https://github.com/apache/nifi |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/apache/nifi |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://nifi.apache.org/security.html#CVE-2023-36542 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T13:50:05Z/ |
|
|
| url |
https://nifi.apache.org/security.html#CVE-2023-36542 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-36542, GHSA-r969-8v3h-23v9
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rv8f-q4a4-xqbk |
|
| 5 |
| url |
VCID-xhjy-xmhq-abh7 |
| vulnerability_id |
VCID-xhjy-xmhq-abh7 |
| summary |
Code injection in Apache NiFi and NiFi Registry
The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-33140 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03884 |
| scoring_system |
epss |
| scoring_elements |
0.88263 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.03884 |
| scoring_system |
epss |
| scoring_elements |
0.882 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03884 |
| scoring_system |
epss |
| scoring_elements |
0.88215 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03884 |
| scoring_system |
epss |
| scoring_elements |
0.88221 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03884 |
| scoring_system |
epss |
| scoring_elements |
0.88241 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03884 |
| scoring_system |
epss |
| scoring_elements |
0.88247 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03884 |
| scoring_system |
epss |
| scoring_elements |
0.88258 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03884 |
| scoring_system |
epss |
| scoring_elements |
0.88251 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03884 |
| scoring_system |
epss |
| scoring_elements |
0.8825 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03884 |
| scoring_system |
epss |
| scoring_elements |
0.88264 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-33140 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-33140, GHSA-77hf-23pq-2g7c
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xhjy-xmhq-abh7 |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 10.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi@1.16.2 |