Apache Ranger: Remote Code Execution Vulnerability in NashornScriptEngineCreator
Description
Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in Apache Ranger versions <= 2.7.0. Users are recommended to upgrade to version 2.8.0, which fixes this issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A remote code execution vulnerability in Apache Ranger's NashornScriptEngineCreator allows attackers to execute arbitrary code on affected systems (versions ≤ 2.7.0).
Vulnerability
Overview
CVE-2025-59059 is a remote code execution (RCE) vulnerability in the NashornScriptEngineCreator component of Apache Ranger, affecting versions up to and including 2.7.0 [1][2][3]. The flaw resides in how the Nashorn JavaScript engine is instantiated and used within Ranger's scripting capabilities. Nashorn, which was deprecated in JDK 15 and removed in later versions, can be abused to execute arbitrary Java code if an attacker can control the script input [3].
Exploitation
Prerequisites
An attacker must be able to supply a malicious script to the NashornScriptEngineCreator, likely through a network-facing interface that accepts user-supplied JavaScript or expressions. No authentication is explicitly mentioned as a barrier, suggesting that unauthenticated or low-privileged users may be able to trigger the vulnerability [3]. The attack surface includes any Ranger service that leverages the Nashorn engine for policy evaluation or dynamic scripting.
Impact
Successful exploitation allows an attacker to execute arbitrary operating system commands or Java code with the privileges of the Ranger process. This could lead to full compromise of the Ranger server, including access to sensitive data managed by Ranger (e.g., Hadoop cluster policies, credentials) and lateral movement within the data infrastructure [2][3].
Mitigation
Apache has released Ranger version 2.8.0, which removes or replaces the vulnerable NashornScriptEngineCreator. Users are strongly advised to upgrade immediately [1][3]. No workarounds have been published, and the vulnerability is considered low severity by the Apache project [3].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.ranger:ranger-plugins-commonMaven | < 2.8.0 | 2.8.0 |
Affected products
2- Apache Software Foundation/Apache Rangerv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-c87w-642h-m97hghsaADVISORY
- lists.apache.org/thread/z47q86rho80390lf2qcmoc2josvs0gtvghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2025-59059ghsaADVISORY
- www.openwall.com/lists/oss-security/2026/03/02/5ghsaWEB
News mentions
0No linked articles in our index yet.