{"url":"http://public2.vulnerablecode.io/api/packages/275414?format=json","purl":"pkg:maven/org.apache.nifi/nifi@1.13.2","type":"maven","namespace":"org.apache.nifi","name":"nifi","version":"1.13.2","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.24.0","latest_non_vulnerable_version":"1.24.0","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/17849?format=json","vulnerability_id":"VCID-3eka-p4cs-f3dz","summary":"Apache NiFi vulnerable to Code Injection\nThe DBCPConnectionPool and HikariCPConnectionPool Controller Services in Apache NiFi 0.0.2 through 1.21.0 allow an authenticated and authorized user to configure a Database URL with the H2 driver that enables custom code execution.\n\nThe resolution validates the Database URL and rejects H2 JDBC locations.\n\nYou are recommended to upgrade to version 1.22.0 or later which fixes this issue.","references":[{"reference_url":"http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:21:50Z/"}],"url":"http://packetstormsecurity.com/files/174398/Apache-NiFi-H2-Connection-String-Remote-Code-Execution.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34468","reference_id":"","reference_type":"","scores":[{"value":"0.77205","scoring_system":"epss","scoring_elements":"0.98973","published_at":"2026-04-13T12:55:00Z"},{"value":"0.77205","scoring_system":"epss","scoring_elements":"0.98967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.77205","scoring_system":"epss","scoring_elements":"0.98974","published_at":"2026-04-16T12:55:00Z"},{"value":"0.77205","scoring_system":"epss","scoring_elements":"0.98975","published_at":"2026-04-21T12:55:00Z"},{"value":"0.77205","scoring_system":"epss","scoring_elements":"0.98969","published_at":"2026-04-07T12:55:00Z"},{"value":"0.77205","scoring_system":"epss","scoring_elements":"0.98971","published_at":"2026-04-09T12:55:00Z"},{"value":"0.77205","scoring_system":"epss","scoring_elements":"0.98972","published_at":"2026-04-12T12:55:00Z"},{"value":"0.77205","scoring_system":"epss","scoring_elements":"0.98965","published_at":"2026-04-02T12:55:00Z"},{"value":"0.77812","scoring_system":"epss","scoring_elements":"0.99009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.77812","scoring_system":"epss","scoring_elements":"0.99017","published_at":"2026-05-05T12:55:00Z"},{"value":"0.77812","scoring_system":"epss","scoring_elements":"0.99013","published_at":"2026-04-29T12:55:00Z"},{"value":"0.77812","scoring_system":"epss","scoring_elements":"0.99011","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34468"},{"reference_url":"https://exceptionfactory.com/posts/2023/10/07/firsthand-analysis-of-apache-nifi-vulnerability-cve-2023-34468","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exceptionfactory.com/posts/2023/10/07/firsthand-analysis-of-apache-nifi-vulnerability-cve-2023-34468"},{"reference_url":"https://github.com/apache/nifi","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi"},{"reference_url":"https://github.com/apache/nifi/commit/4faf3ea59895e7e153db3f8f61147ff70a254361","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi/commit/4faf3ea59895e7e153db3f8f61147ff70a254361"},{"reference_url":"https://github.com/apache/nifi/pull/7349","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi/pull/7349"},{"reference_url":"https://issues.apache.org/jira/browse/NIFI-11653","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/NIFI-11653"},{"reference_url":"https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:21:50Z/"}],"url":"https://lists.apache.org/thread/7b82l4f5blmpkfcynf3y6z4x1vqo59h8"},{"reference_url":"https://nifi.apache.org/security.html#CVE-2023-34468","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:21:50Z/"}],"url":"https://nifi.apache.org/security.html#CVE-2023-34468"},{"reference_url":"https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/06/12/3","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:21:50Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/06/12/3"},{"reference_url":"https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/","reference_id":"apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T20:21:50Z/"}],"url":"https://www.cyfirma.com/outofband/apache-nifi-cve-2023-34468-rce-vulnerability-analysis-and-exploitation/"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34468","reference_id":"CVE-2023-34468","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34468"},{"reference_url":"https://github.com/advisories/GHSA-xm2m-2q6h-22jw","reference_id":"GHSA-xm2m-2q6h-22jw","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-xm2m-2q6h-22jw"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/57917?format=json","purl":"pkg:maven/org.apache.nifi/nifi@1.22.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hy35-v2p5-2ycq"},{"vulnerability":"VCID-rv8f-q4a4-xqbk"},{"vulnerability":"VCID-ues1-6z47-q7hc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi@1.22.0"}],"aliases":["CVE-2023-34468","GHSA-xm2m-2q6h-22jw"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3eka-p4cs-f3dz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/17846?format=json","vulnerability_id":"VCID-4uja-72yx-6qdc","summary":"Deserialization of Untrusted Data\nThe JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location.\n\nThe resolution validates the JNDI URL and restricts locations to a set of allowed schemes.\n\nYou are recommended to upgrade to version 1.22.0 or later which fixes this issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34212","reference_id":"","reference_type":"","scores":[{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73654","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73741","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73749","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73748","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73739","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73716","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73663","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.7578","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00909","scoring_system":"epss","scoring_elements":"0.75759","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-34212"},{"reference_url":"https://github.com/apache/nifi","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi"},{"reference_url":"https://github.com/apache/nifi/commit/3fcb82ee4509d1ad73893d8dca003be6d086c5d6","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi/commit/3fcb82ee4509d1ad73893d8dca003be6d086c5d6"},{"reference_url":"https://github.com/apache/nifi/pull/7313","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi/pull/7313"},{"reference_url":"https://issues.apache.org/jira/browse/NIFI-11614","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/NIFI-11614"},{"reference_url":"https://lists.apache.org/thread/w5rm46fxmvxy216tglf0dv83wo6gnzr5","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:37:27Z/"}],"url":"https://lists.apache.org/thread/w5rm46fxmvxy216tglf0dv83wo6gnzr5"},{"reference_url":"https://nifi.apache.org/security.html#CVE-2023-34212","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:37:27Z/"}],"url":"https://nifi.apache.org/security.html#CVE-2023-34212"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/06/12/2","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-09T13:37:27Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/06/12/2"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34212","reference_id":"CVE-2023-34212","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34212"},{"reference_url":"https://github.com/advisories/GHSA-65wh-g8x8-gm2h","reference_id":"GHSA-65wh-g8x8-gm2h","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-65wh-g8x8-gm2h"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/57917?format=json","purl":"pkg:maven/org.apache.nifi/nifi@1.22.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hy35-v2p5-2ycq"},{"vulnerability":"VCID-rv8f-q4a4-xqbk"},{"vulnerability":"VCID-ues1-6z47-q7hc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi@1.22.0"}],"aliases":["CVE-2023-34212","GHSA-65wh-g8x8-gm2h"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4uja-72yx-6qdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/14007?format=json","vulnerability_id":"VCID-bpqd-tx8f-kycf","summary":"Improper Restriction of XML External Entity Reference\nMultiple components in Apache NiFi 0.0.1 to 1.16.0 do not restrict XML External Entity references in the default configuration. The Standard Content Viewer service attempts to resolve XML External Entity references when viewing formatted XML files. The following Processors attempt to resolve XML External Entity references when configured with default property values: - `EvaluateXPath` - `EvaluateXQuery` - `ValidateXml` Apache NiFi flow configurations that include these Processors is vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations in the default configuration for these Processors, and disallows XML External Entity resolution in standard services.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29265","reference_id":"","reference_type":"","scores":[{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84221","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84146","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84136","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84159","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.8416","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84164","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84189","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84196","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84201","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84098","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.841","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84123","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0212","scoring_system":"epss","scoring_elements":"0.84129","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29265"},{"reference_url":"https://github.com/apache/nifi","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi"},{"reference_url":"https://lists.apache.org/thread/47od9kr9n4cyv0mv81jh3pkyx815kyjl","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread/47od9kr9n4cyv0mv81jh3pkyx815kyjl"},{"reference_url":"https://nifi.apache.org/security.html#CVE-2022-29265","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nifi.apache.org/security.html#CVE-2022-29265"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29265","reference_id":"CVE-2022-29265","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29265"},{"reference_url":"https://github.com/advisories/GHSA-wc97-7623-rxwx","reference_id":"GHSA-wc97-7623-rxwx","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-wc97-7623-rxwx"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/50091?format=json","purl":"pkg:maven/org.apache.nifi/nifi@1.16.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3eka-p4cs-f3dz"},{"vulnerability":"VCID-4uja-72yx-6qdc"},{"vulnerability":"VCID-g74u-zmqj-gyb7"},{"vulnerability":"VCID-hy35-v2p5-2ycq"},{"vulnerability":"VCID-rv8f-q4a4-xqbk"},{"vulnerability":"VCID-xhjy-xmhq-abh7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi@1.16.1"}],"aliases":["CVE-2022-29265","GHSA-wc97-7623-rxwx"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bpqd-tx8f-kycf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/16397?format=json","vulnerability_id":"VCID-g74u-zmqj-gyb7","summary":"XML External Entity Reference in Apache NiFi\nThe ExtractCCDAAttributes Processor in Apache NiFi 1.2.0 through 1.19.1 does not restrict XML External Entity references. Flow configurations that include the ExtractCCDAAttributes Processor are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations and disallows XML External Entity resolution in the ExtractCCDAAttributes Processor.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22832","reference_id":"","reference_type":"","scores":[{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83798","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83926","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83904","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83899","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83892","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83797","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83822","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83866","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83867","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83833","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83837","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02041","scoring_system":"epss","scoring_elements":"0.83828","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22832"},{"reference_url":"https://github.com/apache/nifi","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi"},{"reference_url":"https://github.com/apache/nifi/commit/e966336e8966cf0cbbd12a2c4f2d73a7ceb75cd8","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi/commit/e966336e8966cf0cbbd12a2c4f2d73a7ceb75cd8"},{"reference_url":"https://lists.apache.org/thread/b51qs6y7b7r58vovddkv6wc16g2xbl3w","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-24T16:28:56Z/"}],"url":"https://lists.apache.org/thread/b51qs6y7b7r58vovddkv6wc16g2xbl3w"},{"reference_url":"https://nifi.apache.org/security.html#CVE-2023-22832","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-24T16:28:56Z/"}],"url":"https://nifi.apache.org/security.html#CVE-2023-22832"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22832","reference_id":"CVE-2023-22832","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22832"},{"reference_url":"https://github.com/advisories/GHSA-hxjp-q6c3-38fx","reference_id":"GHSA-hxjp-q6c3-38fx","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-hxjp-q6c3-38fx"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/355490?format=json","purl":"pkg:maven/org.apache.nifi/nifi@1.20.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3eka-p4cs-f3dz"},{"vulnerability":"VCID-4uja-72yx-6qdc"},{"vulnerability":"VCID-hy35-v2p5-2ycq"},{"vulnerability":"VCID-rv8f-q4a4-xqbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi@1.20.0"}],"aliases":["CVE-2023-22832","GHSA-hxjp-q6c3-38fx"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g74u-zmqj-gyb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/19954?format=json","vulnerability_id":"VCID-hy35-v2p5-2ycq","summary":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nApache NiFi 0.7.0 through 1.23.2 include the JoltTransformJSON Processor, which provides an advanced configuration user interface that is vulnerable to DOM-based cross-site scripting. If an authenticated user, who is authorized to configure a JoltTransformJSON Processor, visits a crafted URL, then arbitrary\nJavaScript code can be executed within the session context of the authenticated user. Upgrading to Apache NiFi 1.24.0 or 2.0.0-M1 is the recommended mitigation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-49145","reference_id":"","reference_type":"","scores":[{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52552","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52507","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52565","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52602","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52641","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52656","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52649","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52545","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52578","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.5261","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52625","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52642","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52591","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00293","scoring_system":"epss","scoring_elements":"0.52597","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-49145"},{"reference_url":"https://github.com/apache/nifi","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi"},{"reference_url":"https://github.com/apache/nifi/commit/50efc55df6bb00ea15adcc2459d5cc82d128857f","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi/commit/50efc55df6bb00ea15adcc2459d5cc82d128857f"},{"reference_url":"https://github.com/apache/nifi/pull/8060","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi/pull/8060"},{"reference_url":"https://issues.apache.org/jira/browse/NIFI-12403","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/NIFI-12403"},{"reference_url":"https://lists.apache.org/thread/j8rd0qsvgoj0khqck5f49jfbp0fm8r1o","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread/j8rd0qsvgoj0khqck5f49jfbp0fm8r1o"},{"reference_url":"https://nifi.apache.org/security.html#CVE-2023-49145","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nifi.apache.org/security.html#CVE-2023-49145"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/27/5","reference_id":"","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2023/11/27/5"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-49145","reference_id":"CVE-2023-49145","reference_type":"","scores":[{"value":"7.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-49145"},{"reference_url":"https://github.com/advisories/GHSA-68pr-6fjc-wmgm","reference_id":"GHSA-68pr-6fjc-wmgm","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-68pr-6fjc-wmgm"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/61314?format=json","purl":"pkg:maven/org.apache.nifi/nifi@1.24.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi@1.24.0"}],"aliases":["CVE-2023-49145","GHSA-68pr-6fjc-wmgm"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hy35-v2p5-2ycq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/11880?format=json","vulnerability_id":"VCID-rn4r-36ab-sfey","summary":"Exposure of Sensitive Information to an Unauthorized Actor\nIn the TransformXML processor of Apache NiFi an authenticated user could configure an XSLT file which, if it included malicious external entity calls, may reveal sensitive information.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-44145","reference_id":"","reference_type":"","scores":[{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54524","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54595","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54632","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54634","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54612","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54582","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54599","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54581","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54605","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54574","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.5462","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54616","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-44145"},{"reference_url":"https://nifi.apache.org/security.html#1.15.1-vulnerabilities","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nifi.apache.org/security.html#1.15.1-vulnerabilities"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/12/17/1","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2021/12/17/1"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44145","reference_id":"CVE-2021-44145","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44145"},{"reference_url":"https://github.com/advisories/GHSA-rq96-qhc5-vm4r","reference_id":"GHSA-rq96-qhc5-vm4r","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-rq96-qhc5-vm4r"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/42521?format=json","purl":"pkg:maven/org.apache.nifi/nifi@1.15.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3eka-p4cs-f3dz"},{"vulnerability":"VCID-4uja-72yx-6qdc"},{"vulnerability":"VCID-bpqd-tx8f-kycf"},{"vulnerability":"VCID-dmw5-6pw6-j3d6"},{"vulnerability":"VCID-g74u-zmqj-gyb7"},{"vulnerability":"VCID-hy35-v2p5-2ycq"},{"vulnerability":"VCID-rv8f-q4a4-xqbk"},{"vulnerability":"VCID-xhjy-xmhq-abh7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi@1.15.1"}],"aliases":["CVE-2021-44145","GHSA-rq96-qhc5-vm4r"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rn4r-36ab-sfey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/18547?format=json","vulnerability_id":"VCID-rv8f-q4a4-xqbk","summary":"Apache NiFi Code Injection vulnerability\nApache NiFi 0.0.2 through 1.22.0 include Processors and Controller Services that support HTTP URL references for retrieving drivers, which allows an authenticated and authorized user to configure a location that enables custom code execution. The resolution introduces a new Required Permission for referencing remote resources, restricting configuration of these components to privileged users. The permission prevents unprivileged users from configuring Processors and Controller Services annotated with the new Reference Remote Resources restriction. Upgrading to Apache NiFi 1.23.0 is the recommended mitigation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-36542","reference_id":"","reference_type":"","scores":[{"value":"0.0096","scoring_system":"epss","scoring_elements":"0.76429","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0096","scoring_system":"epss","scoring_elements":"0.76519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0096","scoring_system":"epss","scoring_elements":"0.76419","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0096","scoring_system":"epss","scoring_elements":"0.76515","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0096","scoring_system":"epss","scoring_elements":"0.76479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0096","scoring_system":"epss","scoring_elements":"0.76501","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0096","scoring_system":"epss","scoring_elements":"0.76475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0096","scoring_system":"epss","scoring_elements":"0.76461","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0096","scoring_system":"epss","scoring_elements":"0.76448","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0096","scoring_system":"epss","scoring_elements":"0.76507","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78703","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78678","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78686","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78723","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-36542"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/43","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T13:50:05Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Jul/43"},{"reference_url":"https://github.com/apache/nifi","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi"},{"reference_url":"https://github.com/apache/nifi/commit/532578799c","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi/commit/532578799c"},{"reference_url":"https://issues.apache.org/jira/browse/NIFI-11744","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/NIFI-11744"},{"reference_url":"https://lists.apache.org/thread/swnly3dzhhq9zo3rofc8djq77stkhbof","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T13:50:05Z/"}],"url":"https://lists.apache.org/thread/swnly3dzhhq9zo3rofc8djq77stkhbof"},{"reference_url":"https://nifi.apache.org/security.html#CVE-2023-36542","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T13:50:05Z/"}],"url":"https://nifi.apache.org/security.html#CVE-2023-36542"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/07/29/1","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T13:50:05Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/07/29/1"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36542","reference_id":"CVE-2023-36542","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36542"},{"reference_url":"https://github.com/advisories/GHSA-r969-8v3h-23v9","reference_id":"GHSA-r969-8v3h-23v9","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-r969-8v3h-23v9"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/59199?format=json","purl":"pkg:maven/org.apache.nifi/nifi@1.23.0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hy35-v2p5-2ycq"},{"vulnerability":"VCID-ues1-6z47-q7hc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi@1.23.0"}],"aliases":["CVE-2023-36542","GHSA-r969-8v3h-23v9"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rv8f-q4a4-xqbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54176?format=json","vulnerability_id":"VCID-xhjy-xmhq-abh7","summary":"Code injection in Apache NiFi and NiFi Registry\nThe optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33140","reference_id":"","reference_type":"","scores":[{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.88299","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.88258","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.88251","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.8825","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.88264","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.88263","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.88262","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.8828","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.88285","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.88287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.88215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.88221","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.88241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03884","scoring_system":"epss","scoring_elements":"0.88247","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-33140"},{"reference_url":"https://github.com/apache/nifi","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/nifi"},{"reference_url":"https://lists.apache.org/thread/bzs2pcdjsdrh5039oslmfr9mbs9qqdhr","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread/bzs2pcdjsdrh5039oslmfr9mbs9qqdhr"},{"reference_url":"https://nifi.apache.org/security.html#CVE-2022-33140","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nifi.apache.org/security.html#CVE-2022-33140"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33140","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-33140"},{"reference_url":"https://github.com/advisories/GHSA-77hf-23pq-2g7c","reference_id":"GHSA-77hf-23pq-2g7c","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-77hf-23pq-2g7c"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/81608?format=json","purl":"pkg:maven/org.apache.nifi/nifi@1.16.3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3eka-p4cs-f3dz"},{"vulnerability":"VCID-4uja-72yx-6qdc"},{"vulnerability":"VCID-g74u-zmqj-gyb7"},{"vulnerability":"VCID-hy35-v2p5-2ycq"},{"vulnerability":"VCID-rv8f-q4a4-xqbk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi@1.16.3"}],"aliases":["CVE-2022-33140","GHSA-77hf-23pq-2g7c"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xhjy-xmhq-abh7"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi/nifi@1.13.2"}