Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.zookeeper/zookeeper@3.9.3
Typemaven
Namespaceorg.apache.zookeeper
Namezookeeper
Version3.9.3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.9.5
Latest_non_vulnerable_version3.9.5
Affected_by_vulnerabilities
0
url VCID-6789-5wwx-qqch
vulnerability_id VCID-6789-5wwx-qqch
summary
Apache ZooKeeper: Reverse-DNS fallback enables hostname verification bypass in ZooKeeper ZKTrustManager
Hostname verification in Apache ZooKeeper ZKTrustManager falls back to reverse DNS (PTR) when IP SAN validation fails, allowing attackers who control or spoof PTR records to impersonate ZooKeeper servers or clients with a valid certificate for the PTR name. It's important to note that attacker must present a certificate which is trusted by ZKTrustManager which makes the attack vector harder to exploit. Users are recommended to upgrade to version 3.8.6 or 3.9.5, which fixes this issue by introducing a new configuration option to disable reverse DNS lookup in client and quorum protocols.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24281.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24281.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-24281
reference_id
reference_type
scores
0
value 0.00026
scoring_system epss
scoring_elements 0.07113
published_at 2026-04-04T12:55:00Z
1
value 0.00026
scoring_system epss
scoring_elements 0.07058
published_at 2026-04-02T12:55:00Z
2
value 0.00026
scoring_system epss
scoring_elements 0.07088
published_at 2026-04-07T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08203
published_at 2026-04-09T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08185
published_at 2026-04-08T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08042
published_at 2026-04-18T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08057
published_at 2026-04-16T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08157
published_at 2026-04-13T12:55:00Z
8
value 0.00029
scoring_system epss
scoring_elements 0.08174
published_at 2026-04-12T12:55:00Z
9
value 0.00029
scoring_system epss
scoring_elements 0.08194
published_at 2026-04-11T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.11597
published_at 2026-04-24T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11487
published_at 2026-04-29T12:55:00Z
12
value 0.00039
scoring_system epss
scoring_elements 0.11558
published_at 2026-04-26T12:55:00Z
13
value 0.00039
scoring_system epss
scoring_elements 0.11641
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-24281
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24281
3
reference_url https://github.com/apache/zookeeper
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/zookeeper
4
reference_url https://github.com/apache/zookeeper/commit/66c4efecdda1302d9cfb3af9eedb122b74452bf3
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/zookeeper/commit/66c4efecdda1302d9cfb3af9eedb122b74452bf3
5
reference_url https://issues.apache.org/jira/browse/ZOOKEEPER-4986
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://issues.apache.org/jira/browse/ZOOKEEPER-4986
6
reference_url https://lists.apache.org/thread/088ddsbrzhd5lxzbqf5n24yg0mwh9jt2
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-10T17:36:42Z/
url https://lists.apache.org/thread/088ddsbrzhd5lxzbqf5n24yg0mwh9jt2
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-24281
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-24281
8
reference_url http://www.openwall.com/lists/oss-security/2026/03/07/4
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2026/03/07/4
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130496
reference_id 1130496
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1130496
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2445449
reference_id 2445449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2445449
11
reference_url https://github.com/advisories/GHSA-7xrh-hqfc-g7qr
reference_id GHSA-7xrh-hqfc-g7qr
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7xrh-hqfc-g7qr
12
reference_url https://access.redhat.com/errata/RHSA-2026:10184
reference_id RHSA-2026:10184
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10184
13
reference_url https://access.redhat.com/errata/RHSA-2026:8509
reference_id RHSA-2026:8509
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8509
fixed_packages
0
url pkg:maven/org.apache.zookeeper/zookeeper@3.9.5
purl pkg:maven/org.apache.zookeeper/zookeeper@3.9.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.9.5
aliases CVE-2026-24281, GHSA-7xrh-hqfc-g7qr
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6789-5wwx-qqch
1
url VCID-hbdm-1ts5-f7ad
vulnerability_id VCID-hbdm-1ts5-f7ad
summary
Apache ZooKeeper: Insufficient Permission Check in AdminServer Snapshot/Restore Commands
Improper permission checks in the AdminServer allow an authenticated client with insufficient privileges to invoke the `snapshot` and `restore` commands. The intended requirement is authentication and authorization on the root path (`/`) with **ALL** permission for these operations; however, affected versions permit invocation without that level of authorization. The primary risk is disclosure of cluster state via snapshots to a lesser-privileged client.

*   **Affected:** `org.apache.zookeeper:zookeeper` 3.9.0 through 3.9.3.
*   **Fixed:** 3.9.4 (ZOOKEEPER-4964 “check permissions individually during admin server auth”).
*   **Mitigations:**
*   Disable both commands (`admin.snapshot.enabled`, `admin.restore.enabled`).
*   Disable AdminServer (`admin.enableServer`).
*   Ensure the root ACL is not open; note that ZooKeeper ACLs are not recursive.
*   Upgrade to 3.9.4.
references
0
reference_url http://github.com/apache/zookeeper/commit/71e173fcbcc9deb784081cf867bd045df3c32635
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://github.com/apache/zookeeper/commit/71e173fcbcc9deb784081cf867bd045df3c32635
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58457.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-58457.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-58457
reference_id
reference_type
scores
0
value 0.00108
scoring_system epss
scoring_elements 0.28968
published_at 2026-04-21T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.3257
published_at 2026-04-13T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32598
published_at 2026-04-12T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32636
published_at 2026-04-11T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32634
published_at 2026-04-09T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32608
published_at 2026-04-16T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32561
published_at 2026-04-07T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.3274
published_at 2026-04-04T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32705
published_at 2026-04-02T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32585
published_at 2026-04-18T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.32609
published_at 2026-04-08T12:55:00Z
11
value 0.00141
scoring_system epss
scoring_elements 0.33731
published_at 2026-04-29T12:55:00Z
12
value 0.00141
scoring_system epss
scoring_elements 0.3384
published_at 2026-04-24T12:55:00Z
13
value 0.00141
scoring_system epss
scoring_elements 0.33817
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-58457
3
reference_url https://github.com/apache/zookeeper
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/apache/zookeeper
4
reference_url https://lists.apache.org/thread/r5yol0kkhx2fzw22pxk1ozwm3oc6yxrx
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-24T13:47:31Z/
url https://lists.apache.org/thread/r5yol0kkhx2fzw22pxk1ozwm3oc6yxrx
5
reference_url https://zookeeper.apache.org/doc/current/zookeeperSnapshotAndRestore.html
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://zookeeper.apache.org/doc/current/zookeeperSnapshotAndRestore.html
6
reference_url https://zookeeper.apache.org/doc/r3.9.4/releasenotes.html
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://zookeeper.apache.org/doc/r3.9.4/releasenotes.html
7
reference_url https://zookeeper.apache.org/security.html#CVE-2025-58457
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://zookeeper.apache.org/security.html#CVE-2025-58457
8
reference_url http://www.openwall.com/lists/oss-security/2025/09/24/10
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2025/09/24/10
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116339
reference_id 1116339
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1116339
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397773
reference_id 2397773
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397773
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-58457
reference_id CVE-2025-58457
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-58457
12
reference_url https://github.com/advisories/GHSA-2hmj-97jw-28jh
reference_id GHSA-2hmj-97jw-28jh
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2hmj-97jw-28jh
fixed_packages
0
url pkg:maven/org.apache.zookeeper/zookeeper@3.9.4
purl pkg:maven/org.apache.zookeeper/zookeeper@3.9.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-5wwx-qqch
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.9.4
aliases CVE-2025-58457, GHSA-2hmj-97jw-28jh
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hbdm-1ts5-f7ad
Fixing_vulnerabilities
0
url VCID-ex8w-efvg-2qgv
vulnerability_id VCID-ex8w-efvg-2qgv
summary
Apache ZooKeeper: Authentication bypass with IP-based authentication in Admin Server
When using IPAuthenticationProvider in ZooKeeper Admin Server there is a possibility of Authentication Bypass by Spoofing -- this only impacts IP based authentication implemented in ZooKeeper Admin Server. Default configuration of client's IP address detection in IPAuthenticationProvider, which uses HTTP request headers, is weak and allows an attacker to bypass authentication via spoofing client's IP address in request headers. Default configuration honors X-Forwarded-For HTTP header to read client's IP address. X-Forwarded-For request header is mainly used by proxy servers to identify the client and can be easily spoofed by an attacker pretending that the request comes from a different IP address. Admin Server commands, such as snapshot and restore arbitrarily can be executed on successful exploitation which could potentially lead to information leakage or service availability issues. Users are recommended to upgrade to version 3.9.3, which fixes this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-51504.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-51504.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-51504
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.22934
published_at 2026-04-29T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23265
published_at 2026-04-02T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23308
published_at 2026-04-04T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23097
published_at 2026-04-07T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.23171
published_at 2026-04-08T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23222
published_at 2026-04-09T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23244
published_at 2026-04-11T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23207
published_at 2026-04-12T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23149
published_at 2026-04-13T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.23165
published_at 2026-04-16T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23157
published_at 2026-04-18T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23119
published_at 2026-04-21T12:55:00Z
12
value 0.00078
scoring_system epss
scoring_elements 0.22944
published_at 2026-04-24T12:55:00Z
13
value 0.00078
scoring_system epss
scoring_elements 0.22937
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-51504
2
reference_url https://github.com/apache/zookeeper
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/zookeeper
3
reference_url https://github.com/apache/zookeeper/commit/2c2b74c1c11b6531aabb1bf06782e859048d5983
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/zookeeper/commit/2c2b74c1c11b6531aabb1bf06782e859048d5983
4
reference_url https://lists.apache.org/thread/b3qrmpkto5r6989qr61fw9y2x646kqlh
reference_id
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-07T16:31:39Z/
url https://lists.apache.org/thread/b3qrmpkto5r6989qr61fw9y2x646kqlh
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-51504
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-51504
6
reference_url http://www.openwall.com/lists/oss-security/2024/11/06/5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2024/11/06/5
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087275
reference_id 1087275
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087275
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2324330
reference_id 2324330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2324330
9
reference_url https://github.com/advisories/GHSA-g93m-8x6h-g5gv
reference_id GHSA-g93m-8x6h-g5gv
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g93m-8x6h-g5gv
fixed_packages
0
url pkg:maven/org.apache.zookeeper/zookeeper@3.9.3
purl pkg:maven/org.apache.zookeeper/zookeeper@3.9.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6789-5wwx-qqch
1
vulnerability VCID-hbdm-1ts5-f7ad
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.9.3
aliases CVE-2024-51504, GHSA-g93m-8x6h-g5gv
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ex8w-efvg-2qgv
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.zookeeper/zookeeper@3.9.3