Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/196700?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/196700?format=api", "purl": "pkg:maven/org.apache.nifi/nifi-web-api@1.5.0", "type": "maven", "namespace": "org.apache.nifi", "name": "nifi-web-api", "version": "1.5.0", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.8.0", "latest_non_vulnerable_version": "2.8.0", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50591?format=api", "vulnerability_id": "VCID-mrb8-sr51-vkep", "summary": "Apache NiFi user log out issue\nWhen using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12421", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68341", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68257", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68282", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68269", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68235", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68275", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68286", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68266", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.6831", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68318", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68321", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68295", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68174", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68196", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68214", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00559", "scoring_system": "epss", "scoring_elements": "0.68191", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12421" }, { "reference_url": "https://github.com/apache/nifi/commit/cf6f5172503ce438c6c22c334c9367f774db7b24", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/nifi/commit/cf6f5172503ce438c6c22c334c9367f774db7b24" }, { "reference_url": "https://github.com/apache/nifi/pull/3362", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/nifi/pull/3362" }, { "reference_url": "https://issues.apache.org/jira/browse/NIFI-6085", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.apache.org/jira/browse/NIFI-6085" }, { "reference_url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E" }, { "reference_url": "https://nifi.apache.org/security.html#CVE-2019-12421", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nifi.apache.org/security.html#CVE-2019-12421" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12421", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12421" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*" }, { "reference_url": "https://github.com/advisories/GHSA-fmqw-vqh5-cwq9", "reference_id": "GHSA-fmqw-vqh5-cwq9", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-fmqw-vqh5-cwq9" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/78875?format=api", "purl": "pkg:maven/org.apache.nifi/nifi-web-api@1.10.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7eme-vjmz-5fen" }, { "vulnerability": "VCID-y19q-bhcy-nqdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi-web-api@1.10.0" } ], "aliases": [ "CVE-2019-12421", "GHSA-fmqw-vqh5-cwq9" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mrb8-sr51-vkep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/21995?format=api", "vulnerability_id": "VCID-y19q-bhcy-nqdk", "summary": "Apache NiFi: Missing Authorization of Restricted Permissions for Component Updates\nApache NiFi 1.1.0 through 2.7.2 are missing authorization when updating configuration properties on extension components that have specific Required Permissions based on the Restricted annotation. The Restricted annotation indicates additional privileges required to add the annotated component to the flow configuration, but framework authorization did not check restricted status when updating a component previously added. The missing authorization requires a more privileged user to add a restricted component to the flow configuration, but permits a less privileged user to make property configuration changes. Apache NiFi installations that do not implement different levels of authorization for Restricted components are not subject to this vulnerability because the framework enforces write permissions as the security boundary. Upgrading to Apache NiFi 2.8.0 is the recommended mitigation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-25903", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07292", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0738", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07419", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.073", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07371", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07383", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07397", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07401", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07373", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07318", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07335", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07872", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07788", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07765", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07737", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-25903" }, { "reference_url": "https://github.com/apache/nifi", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:I/V:C/RE:M/U:Amber" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/nifi" }, { "reference_url": "https://github.com/apache/nifi/commit/119f8881fbc3cbd0d522b0c549b841da3de01f64", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:I/V:C/RE:M/U:Amber" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/nifi/commit/119f8881fbc3cbd0d522b0c549b841da3de01f64" }, { "reference_url": "https://issues.apache.org/jira/browse/NIFI-15567", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:I/V:C/RE:M/U:Amber" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.apache.org/jira/browse/NIFI-15567" }, { "reference_url": "https://lists.apache.org/thread/jf6bkt9sk6xvshy8xyxv3vtlxd340345", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:I/V:C/RE:M/U:Amber" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-17T14:29:01Z/" } ], "url": "https://lists.apache.org/thread/jf6bkt9sk6xvshy8xyxv3vtlxd340345" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25903", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:I/V:C/RE:M/U:Amber" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25903" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2026/02/16/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:I/V:C/RE:M/U:Amber" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2026/02/16/1" }, { "reference_url": "https://github.com/advisories/GHSA-c5w7-m8wf-xc77", "reference_id": "GHSA-c5w7-m8wf-xc77", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-c5w7-m8wf-xc77" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/64595?format=api", "purl": "pkg:maven/org.apache.nifi/nifi-web-api@2.8.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi-web-api@2.8.0" } ], "aliases": [ "CVE-2026-25903", "GHSA-c5w7-m8wf-xc77" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y19q-bhcy-nqdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50587?format=api", "vulnerability_id": "VCID-yrgr-3cv3-b3ff", "summary": "Apache NiFi process group information disclosure\nWhen updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10083", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78925", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.7881", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78839", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78836", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78834", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78862", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78869", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78886", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78903", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.7876", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78767", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.7878", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78806", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78814", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.78837", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01188", "scoring_system": "epss", "scoring_elements": "0.7882", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10083" }, { "reference_url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b%40%3Ccommits.nifi.apache.org%3E" }, { "reference_url": "https://nifi.apache.org/security.html#CVE-2019-10083", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nifi.apache.org/security.html#CVE-2019-10083" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10083", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10083" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:nifi:*:*:*:*:*:*:*:*" }, { "reference_url": "https://github.com/advisories/GHSA-26p8-xrj2-mv53", "reference_id": "GHSA-26p8-xrj2-mv53", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-26p8-xrj2-mv53" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/78875?format=api", "purl": "pkg:maven/org.apache.nifi/nifi-web-api@1.10.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-7eme-vjmz-5fen" }, { "vulnerability": "VCID-y19q-bhcy-nqdk" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi-web-api@1.10.0" } ], "aliases": [ "CVE-2019-10083", "GHSA-26p8-xrj2-mv53" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yrgr-3cv3-b3ff" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi-web-api@1.5.0" }