Improper Neutralization of Command Elements in Shell User Group Provider
Description
The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache NiFi and NiFi Registry ShellUserGroupProvider allows OS command injection via unsanitized arguments, requiring authenticated elevated privileges.
The optional ShellUserGroupProvider in Apache NiFi versions 1.10.0 through 1.16.2 and Apache NiFi Registry versions 0.6.0 through 1.16.2 does not neutralize arguments for group resolution commands, enabling operating system command injection on Linux and macOS platforms [1][2]. This component is not included in the default configuration, reducing the attack surface for unmodified deployments.
Exploitation requires the ShellUserGroupProvider to be explicitly enabled as one of the User Group Providers in the Authorizers configuration. An attacker must be an authenticated user with elevated privileges: in Apache NiFi, authorization to modify access policies; in Apache NiFi Registry, authorization to read user groups [2]. The vulnerability arises because user-supplied arguments are passed directly to the shell without sanitization, allowing crafted input to execute arbitrary commands.
Successful command injection allows an attacker to execute arbitrary operating system commands on the server, potentially leading to full system compromise, data exfiltration, or lateral movement within the network. The impact is limited to systems where the ShellUserGroupProvider is enabled and the attacker has the required privileges.
The vulnerability is addressed in Apache NiFi 1.16.3 and Apache NiFi Registry 1.16.3 by removing command formatting based on user-provided arguments [1]. Users are advised to upgrade to these versions or, if the ShellUserGroupProvider is not needed, ensure it is not enabled in the Authorizers configuration.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.nifi.registry:nifi-registry-coreMaven | >= 0.6.0, < 1.16.3 | 1.16.3 |
org.apache.nifi:nifiMaven | >= 1.10.0, < 1.16.3 | 1.16.3 |
Affected products
5- osv-coords3 versions
>= 1.10.0, <= 1.16.2+ 2 more
- (no CPE)range: >= 1.10.0, <= 1.16.2
- (no CPE)range: >= 1.10.0, < 1.16.3
- (no CPE)range: >= 0.6.0, < 1.16.3
- Apache Software Foundation/Apache NiFiv5Range: up to 1.16.2
- Apache Software Foundation/Apache NiFi Registryv5Range: up to 1.16.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-77hf-23pq-2g7cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-33140ghsaADVISORY
- lists.apache.org/thread/bzs2pcdjsdrh5039oslmfr9mbs9qqdhrghsax_refsource_MISCWEB
- nifi.apache.org/security.htmlghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.