VYPR
Critical severityNVD Advisory· Published Feb 20, 2024· Updated Feb 13, 2025

Remote Code Execution in Apache Dolphinscheduler

CVE-2023-49109

Description

Exposure of Remote Code Execution in Apache Dolphinscheduler.

This issue affects Apache DolphinScheduler: before 3.2.1.

We recommend users to upgrade Apache DolphinScheduler to version 3.2.1, which fixes the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache DolphinScheduler before 3.2.1 contains a remote code execution vulnerability. Upgrade to version 3.2.1 to fix it.

Vulnerability

Overview

CVE-2023-49109 is a remote code execution (RCE) vulnerability in Apache DolphinScheduler, affecting versions before 3.2.1 [1][3]. The issue stems from insufficient input validation or improper handling of certain resources, which allows an attacker to execute arbitrary code on the server. The exact root cause appears to be related to a resource quota mechanism that could be manipulated; a related pull request (PR #14991) removes ResourceQuota functionality as part of the fix [4].

Exploitation

To exploit this vulnerability, an attacker likely needs to be an authenticated user with permissions to submit or manage workflows. By crafting a malicious workflow or manipulating resource quota settings, the attacker can inject and execute arbitrary commands on the DolphinScheduler master or worker nodes. The attack surface includes the web UI, API, or Python SDK, which are all used to define task types and dependencies [2].

Impact

Successful exploitation results in full remote code execution on the server, allowing the attacker to compromise the DolphinScheduler instance. This could lead to data exfiltration, service disruption, lateral movement within the network, and further compromise of interconnected systems. The vulnerability is rated as important severity by the Apache project [3].

Mitigation

The vulnerability is fixed in Apache DolphinScheduler version 3.2.1 [1]. Users are strongly advised to upgrade all installations as soon as possible. No workarounds have been officially released; upgrading is the only recommended mitigation. The CVE was publicly disclosed on February 20, 2024 [3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.dolphinscheduler:dolphinschedulerMaven
>= 3.0.0, < 3.2.13.2.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.