VYPR
Moderate severityNVD Advisory· Published Aug 3, 2025· Updated Nov 4, 2025

Apache Zeppelin: Command Injection via CSWSH

CVE-2024-51775

Description

Missing Origin Validation in WebSockets vulnerability in Apache Zeppelin.

The attacker could access the Zeppelin server from another origin without any restriction, and get internal information about paragraphs. This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0.

Users are recommended to upgrade to version 0.12.0, which fixes the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing Origin Validation in WebSockets in Apache Zeppelin allows cross-origin attackers to access internal paragraph information without restriction.

CVE-2024-51775 describes a missing Origin validation vulnerability in Apache Zeppelin's WebSocket connections. The server fails to validate the Origin header during the WebSocket handshake, allowing any website or script from a different origin to establish a connection without restriction. This affects Zeppelin versions from 0.11.1 before 0.12.0 [1][2].

An attacker can exploit this by hosting a malicious page that opens a WebSocket to the Zeppelin server from a different origin. No authentication or special network position is required; the attacker simply needs to lure a user whose browser can reach the Zeppelin server. Once connected, the attacker can retrieve internal information about paragraphs, which may include sensitive data or configuration details [1][2].

The impact is the unauthorized disclosure of internal paragraph information, potentially leading to further attacks. The Apache security team rated this as moderate severity [2].

Mitigation is straightforward: users should upgrade to Apache Zeppelin 0.12.0, which includes a server-side Origin check for WebSocket connections as implemented in pull request #4823 [3]. No workarounds are documented.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.zeppelin:zeppelin-shellMaven
>= 0.11.1, < 0.12.00.12.0

Affected products

2
  • Apache/Zeppelinllm-fuzzy
    Range: >=0.11.1, <0.12.0
  • Apache Software Foundation/Apache Zeppelinv5
    Range: 0.11.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.