Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.nifi/nifi@1.12.1
purl pkg:maven/org.apache.nifi/nifi@1.12.1
Next non-vulnerable version 1.24.0
Latest non-vulnerable version 1.24.0
Risk 10.0
Vulnerabilities affecting this package (9)
Vulnerability Summary Fixed by
VCID-3eka-p4cs-f3dz
Aliases:
CVE-2023-34468
GHSA-xm2m-2q6h-22jw
Apache NiFi vulnerable to Code Injection The DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution. The resolution validates the Database URL and rejects H2 JDBC locations. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
1.22.0
Affected by 3 other vulnerabilities.
VCID-4uja-72yx-6qdc
Aliases:
CVE-2023-34212
GHSA-65wh-g8x8-gm2h
Deserialization of Untrusted Data The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location. The resolution validates the JNDI URL and restricts locations to a set of allowed schemes. You are recommended to upgrade to version 1.22.0 or later which fixes this issue.
1.22.0
Affected by 3 other vulnerabilities.
VCID-bpqd-tx8f-kycf
Aliases:
CVE-2022-29265
GHSA-wc97-7623-rxwx
Improper Restriction of XML External Entity Reference Multiple components in Apache NiFi 0.0.1 to 1.16.0 do not restrict XML External Entity references in the default configuration. The Standard Content Viewer service attempts to resolve XML External Entity references when viewing formatted XML files. The following Processors attempt to resolve XML External Entity references when configured with default property values: - `EvaluateXPath` - `EvaluateXQuery` - `ValidateXml` Apache NiFi flow configurations that include these Processors is vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations in the default configuration for these Processors, and disallows XML External Entity resolution in standard services.
1.16.1
Affected by 6 other vulnerabilities.
VCID-ec58-s3nd-7yaz
Aliases:
CVE-2021-20190
GHSA-5949-rw7g-wx7w
Deserialization of untrusted data in jackson-databind A flaw was found in jackson-databind before 2.9.10.7 and 2.6.7.5. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
1.13.0
Affected by 9 other vulnerabilities.
VCID-g74u-zmqj-gyb7
Aliases:
CVE-2023-22832
GHSA-hxjp-q6c3-38fx
XML External Entity Reference in Apache NiFi The ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML External Entity references. Flow configurations that include the ExtractCCDAAttributes Processor are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations and disallows XML External Entity resolution in the ExtractCCDAAttributes Processor.
1.20.0
Affected by 4 other vulnerabilities.
VCID-hy35-v2p5-2ycq
Aliases:
CVE-2023-49145
GHSA-68pr-6fjc-wmgm
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Apache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then arbitrary JavaScript code can be executed within the session context of the authenticated user. Upgrading to Apache NiFi 1.24.0 or 2.0.0-M1 is the recommended mitigation.
1.24.0
Affected by 0 other vulnerabilities.
VCID-rn4r-36ab-sfey
Aliases:
CVE-2021-44145
GHSA-rq96-qhc5-vm4r
Exposure of Sensitive Information to an Unauthorized Actor In the TransformXML processor of Apache NiFi an authenticated user could configure an XSLT file which, if it included malicious external entity calls, may reveal sensitive information.
1.15.1
Affected by 8 other vulnerabilities.
VCID-rv8f-q4a4-xqbk
Aliases:
CVE-2023-36542
GHSA-r969-8v3h-23v9
Apache NiFi Code Injection vulnerability Apache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.
1.23.0
Affected by 2 other vulnerabilities.
VCID-xhjy-xmhq-abh7
Aliases:
CVE-2022-33140
GHSA-77hf-23pq-2g7c
Code injection in Apache NiFi and NiFi Registry The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.
1.16.3
Affected by 5 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T22:44:02.723907+00:00 GitLab Importer Affected by VCID-hy35-v2p5-2ycq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-49145.yml 38.4.0
2026-04-16T22:35:08.504316+00:00 GitLab Importer Affected by VCID-rv8f-q4a4-xqbk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-36542.yml 38.4.0
2026-04-16T22:31:01.736352+00:00 GitLab Importer Affected by VCID-3eka-p4cs-f3dz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-34468.yml 38.4.0
2026-04-16T22:31:01.418816+00:00 GitLab Importer Affected by VCID-4uja-72yx-6qdc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-34212.yml 38.4.0
2026-04-16T22:21:29.966695+00:00 GitLab Importer Affected by VCID-g74u-zmqj-gyb7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-22832.yml 38.4.0
2026-04-16T22:03:47.097241+00:00 GitLab Importer Affected by VCID-xhjy-xmhq-abh7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2022-33140.yml 38.4.0
2026-04-16T21:45:58.007136+00:00 GitLab Importer Affected by VCID-bpqd-tx8f-kycf https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2022-29265.yml 38.4.0
2026-04-16T21:36:40.565721+00:00 GitLab Importer Affected by VCID-rn4r-36ab-sfey https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2021-44145.yml 38.4.0
2026-04-16T21:15:56.468544+00:00 GitLab Importer Affected by VCID-ec58-s3nd-7yaz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2021-20190.yml 38.4.0
2026-04-12T00:03:38.976947+00:00 GitLab Importer Affected by VCID-hy35-v2p5-2ycq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-49145.yml 38.3.0
2026-04-11T23:54:15.025345+00:00 GitLab Importer Affected by VCID-rv8f-q4a4-xqbk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-36542.yml 38.3.0
2026-04-11T23:49:47.836383+00:00 GitLab Importer Affected by VCID-3eka-p4cs-f3dz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-34468.yml 38.3.0
2026-04-11T23:49:47.465667+00:00 GitLab Importer Affected by VCID-4uja-72yx-6qdc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-34212.yml 38.3.0
2026-04-11T23:39:32.848340+00:00 GitLab Importer Affected by VCID-g74u-zmqj-gyb7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-22832.yml 38.3.0
2026-04-11T23:19:28.596611+00:00 GitLab Importer Affected by VCID-xhjy-xmhq-abh7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2022-33140.yml 38.3.0
2026-04-11T23:01:43.455075+00:00 GitLab Importer Affected by VCID-bpqd-tx8f-kycf https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2022-29265.yml 38.3.0
2026-04-11T22:50:29.550104+00:00 GitLab Importer Affected by VCID-rn4r-36ab-sfey https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2021-44145.yml 38.3.0
2026-04-11T22:28:04.346736+00:00 GitLab Importer Affected by VCID-ec58-s3nd-7yaz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2021-20190.yml 38.3.0
2026-04-03T00:08:19.705258+00:00 GitLab Importer Affected by VCID-hy35-v2p5-2ycq https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-49145.yml 38.1.0
2026-04-02T23:57:20.770079+00:00 GitLab Importer Affected by VCID-rv8f-q4a4-xqbk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-36542.yml 38.1.0
2026-04-02T23:53:04.341621+00:00 GitLab Importer Affected by VCID-3eka-p4cs-f3dz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-34468.yml 38.1.0
2026-04-02T23:53:04.015076+00:00 GitLab Importer Affected by VCID-4uja-72yx-6qdc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-34212.yml 38.1.0
2026-04-02T23:43:42.303353+00:00 GitLab Importer Affected by VCID-g74u-zmqj-gyb7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-22832.yml 38.1.0
2026-04-02T23:26:57.140888+00:00 GitLab Importer Affected by VCID-xhjy-xmhq-abh7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2022-33140.yml 38.1.0
2026-04-02T23:10:11.992587+00:00 GitLab Importer Affected by VCID-bpqd-tx8f-kycf https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2022-29265.yml 38.1.0
2026-04-02T22:59:53.523300+00:00 GitLab Importer Affected by VCID-rn4r-36ab-sfey https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2021-44145.yml 38.1.0
2026-04-02T22:39:42.379048+00:00 GitLab Importer Affected by VCID-ec58-s3nd-7yaz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2021-20190.yml 38.1.0
2026-04-01T18:06:36.551111+00:00 GitLab Importer Affected by VCID-g74u-zmqj-gyb7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2023-22832.yml 38.0.0
2026-04-01T17:47:51.957483+00:00 GitLab Importer Affected by VCID-xhjy-xmhq-abh7 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2022-33140.yml 38.0.0
2026-04-01T17:29:58.373178+00:00 GitLab Importer Affected by VCID-bpqd-tx8f-kycf https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2022-29265.yml 38.0.0
2026-04-01T17:18:37.106735+00:00 GitLab Importer Affected by VCID-rn4r-36ab-sfey https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2021-44145.yml 38.0.0
2026-04-01T16:57:06.412652+00:00 GitLab Importer Affected by VCID-ec58-s3nd-7yaz https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.nifi/nifi/CVE-2021-20190.yml 38.0.0