Apache RCE Vulnerability (CVE-2025-59059)
CVE-2025-59059
Patch now. CVE-2025-59059 grants unauthenticated remote code execution on Apache Ranger 2.7.0 and earlier, enabling full server compromise. Upgrade to 2.8.0.
Patch now - CVE-2025-59059 is a critical remote code execution vulnerability in Apache Ranger versions 2.7.0 and earlier that grants unauthenticated attackers full server compromise. Upgrade to version 2.8.0 immediately to block exploitation.
Overview
A critical security vulnerability has been identified in Apache Ranger, a framework for data security management across Hadoop and related platforms. This flaw, tracked as CVE-2025-59059, could allow an unauthenticated remote attacker to execute arbitrary code on affected systems.
Vulnerability Details
In simple terms, Apache Ranger versions 2.7.0 and earlier contain a vulnerable component called NashornScriptEngineCreator. This component is responsible for processing certain scripts. Due to insufficient input validation, a specially crafted script sent to a Ranger server can bypass security restrictions. This allows an attacker to run any command or code they choose on the underlying server with the same permissions as the Ranger service, typically resulting in full system compromise.
Impact Assessment
The impact of this vulnerability is severe (CVSS Score: 9.8 - CRITICAL).
- Remote Code Execution (RCE): An attacker can gain complete control over the affected server without needing any prior authentication (username or password).
- Data Breach: Compromised systems can lead to the theft, modification, or deletion of sensitive data managed by Ranger, such as security policies and audit logs.
- System Compromise: An attacker could install malware, create backdoors, or use the server as a foothold to attack other systems within the network.
Affected Versions
- Apache Ranger versions 2.7.0 and all earlier releases.
Remediation and Mitigation
The primary and most effective action is immediate upgrading.
-
Immediate Upgrade (Recommended): Upgrade Apache Ranger to version 2.8.0 or later. This version contains the necessary fix. Download the patched version from the official Apache Ranger website or your trusted distribution channel.
-
If Immediate Upgrade is Not Possible:
- Network Isolation: Restrict network access to the Ranger admin and service ports (e.g., 6080, 6182) using firewalls. Allow connections only from trusted, necessary IP addresses (like administrative networks).
- Review and Monitor: Closely monitor Ranger servers for any unusual activity or unauthorized access attempts in audit logs. There is no known configuration-based workaround that eliminates the vulnerability without applying the patch.
Additional Actions
After upgrading, it is considered a security best practice to:
- Rotate any credentials or keys that were stored on or managed by the affected Ranger server.
- Review systems for any indicators of compromise that may have occurred before the patch was applied.
You should prioritize applying this update due to the critical severity and the ease with which this vulnerability can be exploited remotely.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Am I Affected by CVE-2025-59059?
Pick an ecosystem, paste your installed version, and we'll compare it against the fixed version published on OSV.dev. Browser-only — nothing is sent to a server.
Heuristic comparison only. Always cross-check against the vendor advisory before making patching decisions.
Related Advisories
ai-scanner is an AI model safety scanner built on NVIDIA garak. From version 1.0.0 to before version 1.4.1, there is a remote code execution vulnerability via JavaScript injection in `BrowserAutomatio...
vm2 is an open source vm/sandbox for Node.js. Prior to version 3.11.0, VM2 suffers from a sandbox breakout vulnerability. This allows attackers to write code which can escape from the VM2 sandbox and ...
vm2 is an open source vm/sandbox for Node.js. Prior to version 3.10.5, the fix for CVE-2023-37466 is insufficient and can be circumvented allowing attackers to write code which can escape from the VM2...
vm2 is an open source vm/sandbox for Node.js. Prior to version 3.11.0, VM2 suffers from a sandbox breakout vulnerability through the inspect function. This allows attackers to write code which can esc...