Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apache SeaTunnel Vulnerability Allows Unauthorized Users to Perform Deserialization Attack

Posted on June 20, 2025June 20, 2025 By CWS

Apache SeaTunnel, the extensively used distributed information integration platform, has disclosed a major safety vulnerability that permits unauthorized customers to execute arbitrary file learn operations and deserialization assaults via its RESTful API interface. 

The vulnerability, tracked as CVE-2025-32896 and reported on April 12, 2025, impacts a number of variations of the platform and has been labeled with reasonable severity.

Apache SeaTunnel RCE Vulnerability

The safety flaw impacts Apache SeaTunnel variations 2.3.1 via 2.3.10, creating a considerable publicity window for organizations using these variations in manufacturing environments. 

The vulnerability stems from inadequate entry controls within the platform’s RESTful API-v1 implementation, particularly focusing on the /hazelcast/relaxation/maps/submit-job endpoint. 

This endpoint, designed for job submission performance, lacks correct authentication mechanisms, permitting malicious actors to use the system with out legitimate credentials.

Safety researcher Owen Amadeus found and reported this vulnerability, highlighting how unauthorized customers can bypass safety controls to entry delicate system sources. 

The technical nature of this flaw includes the manipulation of MySQL connection parameters, the place attackers can inject malicious payloads via URL parameters to realize their aims. 

This assault vector is especially regarding as a result of it combines two vital safety dangers: arbitrary file entry and deserialization vulnerabilities, which may result in distant code execution eventualities.

The exploitation mechanism facilities across the manipulation of database connection strings throughout the SeaTunnel job submission course of. 

Attackers can craft specifically designed MySQL URLs containing further parameters that set off each arbitrary file learn operations and Java deserialization assaults. The susceptible endpoint /hazelcast/relaxation/maps/submit-job processes these malicious requests with out correct validation or authentication checks.

The deserialization part of this assault is especially harmful, as it will possibly permit attackers to execute arbitrary code on the goal system.

By submitting crafted serialized objects via the job submission interface, malicious actors can probably achieve full management over the affected SeaTunnel occasion. 

Any such vulnerability exploits Java’s object serialization mechanism, the place untrusted information may be deserialized into executable code, bypassing conventional safety boundaries.

Danger FactorsDetailsAffected ProductsApache SeaTunnel variations 2.3.1 via 2.3.10ImpactRemote Code Execution (RCE)Exploit Stipulations– Community entry to SeaTunnel instance- API-v1 enabled (default)- Absence of HTTPS two-way authenticationCVSS 3.1 Score8.2 (Excessive)

Remediation Steps

The Apache SeaTunnel improvement crew has addressed this vulnerability in model 2.3.11, implementing complete safety enhancements to stop unauthorized entry. 

Organizations working affected variations ought to instantly improve to the newest launch to mitigate potential safety dangers. The repair consists of enhanced authentication mechanisms and enter validation procedures.

Past model upgrades, directors are strongly suggested to implement further safety measures. 

The Apache crew recommends enabling RESTful API-v2 performance, which incorporates improved safety controls and authentication frameworks. 

Moreover, implementing HTTPS two-way authentication gives a further safety layer by making certain mutual certificates validation between shoppers and servers.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free trial

Cyber Security News Tags:Apache, Attack, Deserialization, Perform, SeaTunnel, Unauthorized, Users, Vulnerability

Post navigation

Previous Post: Cloudflare Tunnels Abused in New Malware Campaign
Next Post: Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider

Related Posts

Critical WordPress Plugin Vulnerability Exposes 10K+ Sites to Cyber Attack Cyber Security News
Blockchain Security – Protecting Decentralized Systems Cyber Security News
Former GCHQ Intern Jailed for Seven Years After Copying Top Secret Files to Mobile Phone Cyber Security News
Threat Actors Leverages DeepSeek-R1 Popularity to Attack Users Running Windows Devices Cyber Security News
Password Reset Poisoning Attack Allows Account Takeover Using the Password Reset Link Cyber Security News
New Crocodilus Malware That Gain Complete Control of Android Device Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer
  • Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • Godfather Android Trojan Creates Sandbox on Infected Devices
  • Motors Theme Vulnerability Exploited to Hack WordPress Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • In Other News: Viasat Hacked by China, Washington Post Cyberattack, Crowhammer
  • Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • Godfather Android Trojan Creates Sandbox on Infected Devices
  • Motors Theme Vulnerability Exploited to Hack WordPress Websites

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News