Maven package
org.apache.streampark/streampark
pkg:maven/org.apache.streampark/streampark
Vulnerabilities (12)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-53960 | — | >= 2.0.0, < 2.1.7 | 2.1.7 | Dec 12, 2025 | When issuing JSON Web Tokens (JWT), Apache StreamPark directly uses the user's password as the HMAC signing key (e.g., with the HS256 algorithm). An attacker can exploit this vulnerability to perform offline brute-force attacks on the user's password using a captured JWT, or to a | ||
| CVE-2025-54947 | — | >= 2.0.0, < 2.1.7 | 2.1.7 | Dec 12, 2025 | In Apache StreamPark versions 2.0.0 through 2.1.7, a security vulnerability involving a hard-coded encryption key exists. This vulnerability occurs because the system uses a fixed, immutable key for encryption instead of dynamically generating or securely configuring the key. Att | ||
| CVE-2025-54981 | — | >= 2.0.0, < 2.1.7 | 2.1.7 | Dec 12, 2025 | Weak Encryption Algorithm in StreamPark, The use of an AES cipher in ECB mode and a weak random number generator for encrypting sensitive data, including JWT tokens, may have risked exposing sensitive authentication data This issue affects Apache StreamPark: from 2.0.0 before 2. | ||
| CVE-2025-30001 | — | <= 2.1.5 | — | Oct 10, 2025 | Incorrect Execution-Assigned Permissions vulnerability in Apache StreamPark. This issue affects Apache StreamPark: from 2.1.4 before 2.1.6. Users are recommended to upgrade to version 2.1.6, which fixes the issue. | ||
| CVE-2024-29178 | — | < 2.1.4 | 2.1.4 | Jul 18, 2024 | On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability. Mitigation: all users shou | ||
| CVE-2024-29120 | — | >= 2.0.0, < 2.1.4 | 2.1.4 | Jul 17, 2024 | In Streampark (version < 2.1.4), when a user logged in successfully, the Backend service would return "Authorization" as the front-end authentication credential. User can use this credential to request other users' information, including the administrator's username, password, s | ||
| CVE-2024-29737 | — | < 2.1.4 | 2.1.4 | Jul 17, 2024 | In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the stream | ||
| CVE-2023-52291 | — | < 2.1.4 | 2.1.4 | Jul 17, 2024 | In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the stream | ||
| CVE-2023-30867 | — | >= 2.0.0, < 2.1.2 | 2.1.2 | Dec 15, 2023 | In the Streampark platform, when users log in to the system and use certain features, some pages provide a name-based fuzzy search, such as job names, role names, etc. The sql syntax :select * from table where jobName like '%jobName%'. However, the jobName field may receive illeg | ||
| CVE-2023-49898 | — | >= 2.0.0, < 2.1.2 | 2.1.2 | Dec 15, 2023 | In streampark, there is a project module that integrates Maven's compilation capability. However, there is no check on the compilation parameters of Maven. allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the use | ||
| CVE-2022-46365 | — | >= 1.0.0, < 2.0.0 | 2.0.0 | May 1, 2023 | Apache StreamPark 1.0.0 before 2.0.0 When the user successfully logs in, to modify his profile, the username will be passed to the server-layer as a parameter, but not verified whether the user name is the currently logged user and whether the user is legal, This will allow malic | ||
| CVE-2022-45801 | — | >= 1.0.0, < 2.0.0 | 2.0.0 | May 1, 2023 | Apache StreamPark 1.0.0 to 2.0.0 have a LDAP injection vulnerability. LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. When an application fails to properly sanitize user input, it's possible to modify LDAP sta |
- CVE-2025-53960Dec 12, 2025affected >= 2.0.0, < 2.1.7fixed 2.1.7
When issuing JSON Web Tokens (JWT), Apache StreamPark directly uses the user's password as the HMAC signing key (e.g., with the HS256 algorithm). An attacker can exploit this vulnerability to perform offline brute-force attacks on the user's password using a captured JWT, or to a
- CVE-2025-54947Dec 12, 2025affected >= 2.0.0, < 2.1.7fixed 2.1.7
In Apache StreamPark versions 2.0.0 through 2.1.7, a security vulnerability involving a hard-coded encryption key exists. This vulnerability occurs because the system uses a fixed, immutable key for encryption instead of dynamically generating or securely configuring the key. Att
- CVE-2025-54981Dec 12, 2025affected >= 2.0.0, < 2.1.7fixed 2.1.7
Weak Encryption Algorithm in StreamPark, The use of an AES cipher in ECB mode and a weak random number generator for encrypting sensitive data, including JWT tokens, may have risked exposing sensitive authentication data This issue affects Apache StreamPark: from 2.0.0 before 2.
- CVE-2025-30001Oct 10, 2025affected <= 2.1.5
Incorrect Execution-Assigned Permissions vulnerability in Apache StreamPark. This issue affects Apache StreamPark: from 2.1.4 before 2.1.6. Users are recommended to upgrade to version 2.1.6, which fixes the issue.
- CVE-2024-29178Jul 18, 2024affected < 2.1.4fixed 2.1.4
On versions before 2.1.4, a user could log in and perform a template injection attack resulting in Remote Code Execution on the server, The attacker must successfully log into the system to launch an attack, so this is a moderate-impact vulnerability. Mitigation: all users shou
- CVE-2024-29120Jul 17, 2024affected >= 2.0.0, < 2.1.4fixed 2.1.4
In Streampark (version < 2.1.4), when a user logged in successfully, the Backend service would return "Authorization" as the front-end authentication credential. User can use this credential to request other users' information, including the administrator's username, password, s
- CVE-2024-29737Jul 17, 2024affected < 2.1.4fixed 2.1.4
In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the stream
- CVE-2023-52291Jul 17, 2024affected < 2.1.4fixed 2.1.4
In streampark, the project module integrates Maven's compilation capabilities. The input parameter validation is not strict, allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the user needs to log in to the stream
- CVE-2023-30867Dec 15, 2023affected >= 2.0.0, < 2.1.2fixed 2.1.2
In the Streampark platform, when users log in to the system and use certain features, some pages provide a name-based fuzzy search, such as job names, role names, etc. The sql syntax :select * from table where jobName like '%jobName%'. However, the jobName field may receive illeg
- CVE-2023-49898Dec 15, 2023affected >= 2.0.0, < 2.1.2fixed 2.1.2
In streampark, there is a project module that integrates Maven's compilation capability. However, there is no check on the compilation parameters of Maven. allowing attackers to insert commands for remote command execution, The prerequisite for a successful attack is that the use
- CVE-2022-46365May 1, 2023affected >= 1.0.0, < 2.0.0fixed 2.0.0
Apache StreamPark 1.0.0 before 2.0.0 When the user successfully logs in, to modify his profile, the username will be passed to the server-layer as a parameter, but not verified whether the user name is the currently logged user and whether the user is legal, This will allow malic
- CVE-2022-45801May 1, 2023affected >= 1.0.0, < 2.0.0fixed 2.0.0
Apache StreamPark 1.0.0 to 2.0.0 have a LDAP injection vulnerability. LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. When an application fails to properly sanitize user input, it's possible to modify LDAP sta