VYPR
Moderate severityOSV Advisory· Published Jan 1, 2026· Updated Jan 5, 2026

Apache StreamPipes: Leverage of User ID for Privilege Escalation

CVE-2025-47411

Description

A user with a legitimate non-administrator account can exploit a vulnerability in the user ID creation mechanism in Apache StreamPipes that allows them to swap the username of an existing user with that of an administrator.

This vulnerability allows an attacker to gain administrative control over the application by manipulating JWT tokens, which can lead to data tampering, unauthorized access and other security issues.

This issue affects Apache StreamPipes: through 0.97.0.

Users are recommended to upgrade to version 0.98.0, which fixes the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A non-admin user can exploit a flaw in user ID creation in Apache StreamPipes to replace an admin's username and gain administrative control via JWT token manipulation.

In Apache StreamPipes through version 0.97.0, a flaw exists in the user ID creation mechanism that allows a legitimate non-administrator user to swap their username with that of an existing administrator [1][4]. This vulnerability stems from improper handling of user identifiers during account creation, enabling an attacker to manipulate the association between usernames and user IDs.

An attacker with a valid non-admin account can exploit this flaw by crafting requests that alter the user ID mapping. This manipulation directly affects the generation of JWT tokens, which are used for authentication and authorization. No special network position is required beyond standard application access; the prerequisite is merely having a legitimate non-administrator account.

Successful exploitation grants the attacker full administrative control over the StreamPipes application. This allows the attacker to tamper with data, access restricted resources, perform unauthorized actions, and potentially compromise the entire system's integrity and confidentiality.

The issue has been fixed in Apache StreamPipes version 0.98.0 [2]. Users are strongly recommended to upgrade to this version to mitigate the vulnerability. No workarounds have been published; upgrading is the only known remediation.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.streampipes:streampipes-parentMaven
>= 0.69.0, < 0.98.00.98.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.