Critical (9.8)

Apache RCE Vulnerability (CVE-2025-59059)

CVE-2025-59059

Remote Code Execution Vulnerability in NashornScriptEngineCreator is reported in Apache Ranger versions <= 2.7.0. Users are recommended to upgrade to version 2.8.0, which fixes this issue....

Affected: Apache

Overview

A critical security vulnerability has been identified in Apache Ranger, a framework for data security management across Hadoop and related platforms. This flaw, tracked as CVE-2025-59059, could allow an unauthenticated remote attacker to execute arbitrary code on affected systems.

Vulnerability Details

In simple terms, Apache Ranger versions 2.7.0 and earlier contain a vulnerable component called NashornScriptEngineCreator. This component is responsible for processing certain scripts. Due to insufficient input validation, a specially crafted script sent to a Ranger server can bypass security restrictions. This allows an attacker to run any command or code they choose on the underlying server with the same permissions as the Ranger service, typically resulting in full system compromise.

Impact Assessment

The impact of this vulnerability is severe (CVSS Score: 9.8 - CRITICAL).

  • Remote Code Execution (RCE): An attacker can gain complete control over the affected server without needing any prior authentication (username or password).
  • Data Breach: Compromised systems can lead to the theft, modification, or deletion of sensitive data managed by Ranger, such as security policies and audit logs.
  • System Compromise: An attacker could install malware, create backdoors, or use the server as a foothold to attack other systems within the network.

Affected Versions

  • Apache Ranger versions 2.7.0 and all earlier releases.

Remediation and Mitigation

The primary and most effective action is immediate upgrading.

  1. Immediate Upgrade (Recommended): Upgrade Apache Ranger to version 2.8.0 or later. This version contains the necessary fix. Download the patched version from the official Apache Ranger website or your trusted distribution channel.

  2. If Immediate Upgrade is Not Possible:

    • Network Isolation: Restrict network access to the Ranger admin and service ports (e.g., 6080, 6182) using firewalls. Allow connections only from trusted, necessary IP addresses (like administrative networks).
    • Review and Monitor: Closely monitor Ranger servers for any unusual activity or unauthorized access attempts in audit logs. There is no known configuration-based workaround that eliminates the vulnerability without applying the patch.

Additional Actions

After upgrading, it is considered a security best practice to:

  • Rotate any credentials or keys that were stored on or managed by the affected Ranger server.
  • Review systems for any indicators of compromise that may have occurred before the patch was applied.

You should prioritize applying this update due to the critical severity and the ease with which this vulnerability can be exploited remotely.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Am I Affected by CVE-2025-59059?

Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.

Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.