Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAEqiR7SDjvexnZ13sYUaMFYMcqk+hgLzOmTJ4MwEyrD=Z9tqcA@mail.gmail.com>
Date: Mon, 13 Apr 2026 09:25:52 -0500
From: David Handermann <exceptionfactory@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2026-39816: Apache NiFi: Missing Execute Code Required Permission
 on TinkerpopClientService

Severity: High

Affected versions:

- Apache NiFi (org.apache.nifi:nifi-other-graph-services-nar) 2.0.0-M1
through 2.8.0

Description:

The optional extension component TinkerpopClientService is missing the
Restricted annotation with the Execute Code Required Permission in
Apache NiFi 2.0.0-M1 through 2.8.0. The TinkerpopClientService
supports configuration of ByteCode Submission for the Script
Submission Type, enabling Groovy Script execution in the service prior
to submitting the query. The missing Restricted annotation allows
users without the Execute Code Permission to configure the Service in
installations that use fine-grained authorization and have the
optional TinkerpopClientService installed. Apache NiFi installations
that do not have the nifi-other-graph-services-nar installed are not
subject to this vulnerability. Upgrading to Apache NiFi 2.9.0 is the
recommended mitigation.

This issue is being tracked as NIFI-15800

Credit:

John Walker from ZeroPath (finder)

References:

https://nifi.apache.org/
https://www.cve.org/CVERecord?id=CVE-2026-39816
https://issues.apache.org/jira/browse/NIFI-15800

Timeline:

2026-04-03: reported
2026-04-06: patched

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.