Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-39816— Apache NiFi: Missing Execute Code Required Permission on TinkerpopClientService

EPSS 0.02% · P4
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-39816

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache NiFi: Missing Execute Code Required Permission on TinkerpopClientService
Source: NVD (National Vulnerability Database)
Vulnerability Description
The optional extension component TinkerpopClientService is missing the Restricted annotation with the Execute Code Required Permission in Apache NiFi 2.0.0-M1 through 2.8.0. The TinkerpopClientService supports configuration of ByteCode Submission for the Script Submission Type, enabling Groovy Script execution in the service prior to submitting the query. The missing Restricted annotation allows users without the Execute Code Permission to configure the Service in installations that use fine-grained authorization and have the optional TinkerpopClientService installed. Apache NiFi installations that do not have the nifi-other-graph-services-nar installed are not subject to this vulnerability. Upgrading to Apache NiFi 2.9.0 is the recommended mitigation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制缺失
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache NiFi 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache NiFi是美国阿帕奇(Apache)基金会的一套数据处理和分发系统。该系统主要用于数据路由、转换和系统中介逻辑。 Apache NiFi 2.0.0-M1版本至2.8.0版本存在安全漏洞,该漏洞源于可选扩展组件TinkerpopClientService缺少Restricted注解,可能导致未授权用户配置服务并执行Groovy脚本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache NiFi 2.0.0-M1 ~ 2.8.0 -

II. Public POCs for CVE-2026-39816

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-39816

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2026-05-08 · 8 CVEs total

CVE-2025-664678.0 HIGHApache CloudStack: MinIO policy remains intact on bucket deletion
CVE-2025-692336.5 MEDIUMApache CloudStack: Domain/account resources limits not honored
CVE-2026-25199Apache CloudStack: Proxmox Extension Allows Unauthorized Cross-Tenant Instance Access
CVE-2026-25077Apache CloudStack: Unauthenticated Command Injection in Direct Download Templates
CVE-2025-66172Apache CloudStack: Any user can attach a volume in their VMs from backups they should not
CVE-2025-66171Apache CloudStack: Any user can create a new VM from backups they should not have access t
CVE-2025-66170Apache CloudStack: Any user can list backups that they should not have access to

IV. Related Vulnerabilities

V. Comments for CVE-2026-39816

No comments yet


Leave a comment