VYPR
Moderate severityNVD Advisory· Published Mar 13, 2026· Updated Mar 13, 2026

Apache Livy: Restrict file access

CVE-2025-60012

Description

Malicious configuration can lead to unauthorized file access in Apache Livy.

This issue affects Apache Livy 0.7.0 and 0.8.0 when connecting to Apache Spark 3.1 or later.

A request that includes a Spark configuration value supported from Apache Spark version 3.1 can lead to users gaining access to files they do not have permissions to.

For the vulnerability to be exploitable, the user needs to have access to Apache Livy's REST or JDBC interface and be able to send requests with arbitrary Spark configuration values.

Users are recommended to upgrade to version 0.9.0 or later, which fixes the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Livy 0.7.0 and 0.8.0 allow unauthorized file access via malicious Spark configuration values when connecting to Spark 3.1+.

Vulnerability

Description

Apache Livy versions 0.7.0 and 0.8.0 contain a vulnerability that allows unauthorized file access when connecting to Apache Spark 3.1 or later [1]. The root cause is that Livy does not properly validate Spark configuration values provided by users in requests. A malicious configuration value, supported from Spark 3.1 onward, can be used to read files on the server that the user should not have access to [3].

Exploitation

Prerequisites

An attacker must have access to Apache Livy's REST or JDBC interface and be able to send requests with arbitrary Spark configuration values [1]. No additional authentication is mentioned, but the attacker needs network access to the Livy endpoint. The vulnerability is exploitable without prior authentication if the interface is exposed.

Impact

Successful exploitation allows an attacker to read arbitrary files on the Livy server that the Livy process has access to, potentially exposing sensitive data such as configuration files, credentials, or application data [3].

Mitigation

Users should upgrade to Apache Livy version 0.9.0 or later, which fixes the issue [1]. No workarounds are documented. The vulnerability affects only Livy 0.7.0 and 0.8.0 when used with Spark 3.1+.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.livy:livy-serverMaven
>= 0.7.0-incubating, < 0.9.0-incubating0.9.0-incubating

Affected products

3
  • Apache/Sparkllm-fuzzy
    Range: >=3.1
  • Apache/Livyllm-fuzzy
    Range: >=0.7.0, <=0.8.0
  • Apache Software Foundation/Apache Livyv5
    Range: 0.7.0-incubating

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.