VYPR

Maven package

org.apache.streampark/streampark

pkg:maven/org.apache.streampark/streampark

Vulnerabilities (12)

  • CVE-2025-53960Dec 12, 2025
    affected >= 2.0.0, < 2.1.7fixed 2.1.7

    When issuing JSON Web Tokens (JWT), Apache StreamPark directly uses the user's password as the HMAC signing key (e.g., with the HS256 algorithm). An attacker can exploit this vulnerability to perform offline brute-force attacks on the user's password using a captured JWT, or to a

  • CVE-2025-54947Dec 12, 2025
    affected >= 2.0.0, < 2.1.7fixed 2.1.7

    In Apache StreamPark versions 2.0.0 through 2.1.7, a security vulnerability involving a hard-coded encryption key exists. This vulnerability occurs because the system uses a fixed, immutable key for encryption instead of dynamically generating or securely configuring the key. Att

  • CVE-2025-54981Dec 12, 2025
    affected >= 2.0.0, < 2.1.7fixed 2.1.7

    Weak Encryption Algorithm in StreamPark, The use of an AES cipher in ECB mode and a weak random number generator for encrypting sensitive data, including JWT tokens, may have risked exposing sensitive authentication data This issue affects Apache StreamPark: from 2.0.0 before 2.

  • CVE-2025-30001Oct 10, 2025
    affected <= 2.1.5

    Incorrect Execution-Assigned Permissions vulnerability in Apache StreamPark. This issue affects Apache StreamPark: from 2.1.4 before 2.1.6. Users are recommended to upgrade to version 2.1.6, which fixes the issue.

  • CVE-2024-29178Jul 18, 2024
    affected < 2.1.4fixed 2.1.4

    On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability. Mitigation: all users shou

  • CVE-2024-29120Jul 17, 2024
    affected >= 2.0.0, < 2.1.4fixed 2.1.4

    In Streampark (version < 2.1.4), when a user logged in successfully, the Backend service would return "Authorization" as the front-end authentication credential. User can use this credential to request other users' information, including the administrator's username, password, s

  • CVE-2024-29737Jul 17, 2024
    affected < 2.1.4fixed 2.1.4

    In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the stream

  • CVE-2023-52291Jul 17, 2024
    affected < 2.1.4fixed 2.1.4

    In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the stream

  • CVE-2023-30867Dec 15, 2023
    affected >= 2.0.0, < 2.1.2fixed 2.1.2

    In the Streampark platform, when users log in to the system and use certain features, some pages provide a name-based fuzzy search, such as job names, role names, etc. The sql syntax :select * from table where jobName like '%jobName%'. However, the jobName field may receive illeg

  • CVE-2023-49898Dec 15, 2023
    affected >= 2.0.0, < 2.1.2fixed 2.1.2

    In streampark, there is a project module that integrates Maven's compilation capability. However, there is no check on the compilation parameters of Maven. allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the use

  • CVE-2022-46365May 1, 2023
    affected >= 1.0.0, < 2.0.0fixed 2.0.0

    Apache StreamPark 1.0.0 before 2.0.0 When the user successfully logs in, to modify his profile, the username will be passed to the server-layer as a parameter, but not verified whether the user name is the currently logged user and whether the user is legal, This will allow malic

  • CVE-2022-45801May 1, 2023
    affected >= 1.0.0, < 2.0.0fixed 2.0.0

    Apache StreamPark 1.0.0 to 2.0.0 have a LDAP injection vulnerability. LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. When an application fails to properly sanitize user input, it's possible to modify LDAP sta