CVE-2025-27017:
Apache NiFi: Potential Insertion of MongoDB Password in Provenance Record
6.9
CVSS Score
4.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.2243%
CWE
Published
3/12/2025
Updated
3/12/2025
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:U/V:C/RE:L/U:Green
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.nifi:nifi-mongodb-services | maven | >= 1.13.0, < 2.3.0 | 2.3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from credentials being included in provenance events. The commit diff shows the removal of the getURI
method, which previously manually injected credentials into the MongoDB
connection URI using URL encoding. This URI was likely logged in provenance events. The patched version avoids embedding credentials in the URI by using MongoCredential
separately, and the test update verifies the transit URI no longer contains credentials. The getURI()
function's role in constructing the credential-containing URI directly matches the vulnerability's root cause.