{"uuid": "899b236a-136f-4b12-bbab-5480bb8c8e2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27017", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7333", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27017\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/S:P/AU:Y/R:U/V:C/RE:L/U:Green)\n\ud83d\udd39 Description: Apache NiFi 1.13.0 through 2.2.0 includes the username and password used to authenticate with MongoDB in the NiFi provenance events that MongoDB components generate during processing. An authorized user with read access to the provenance events of those processors may see the credentials information. Upgrading to Apache NiFi 2.3.0 is the recommended mitigation, which removes the credentials from provenance event records.\n\ud83d\udccf Published: 2025-03-12T16:19:45.206Z\n\ud83d\udccf Modified: 2025-03-12T16:19:45.206Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/d4n5474jkhp82dvnht13pjtlfx7bhn5q", "creation_timestamp": "2025-03-12T16:41:12.000000Z"}