{"vulnerability": "CVE-2025-27017", "sightings": [{"uuid": "688849cc-843a-4d37-b370-4b360cf1f20e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27017", "type": "seen", "source": "https://t.me/cvedetector/20146", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27017 - Apache NiFi MongoDB Authentication Credential Exposure\", \n  \"Content\": \"CVE ID : CVE-2025-27017 \nPublished : March 12, 2025, 5:15 p.m. | 1\u00a0hour, 58\u00a0minutes ago \nDescription : Apache NiFi 1.13.0 through 2.2.0 includes the username and password used to authenticate with MongoDB in the NiFi provenance events that MongoDB components generate during processing. An authorized user with read access to the provenance events of those processors may see the credentials information. Upgrading to Apache NiFi 2.3.0 is the recommended mitigation, which removes the credentials from provenance event records. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-12T20:22:55.000000Z"}, {"uuid": "8496ae34-02d9-4491-83ce-cacf3bdabb06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27017", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lk4fi23itd2k", "content": "", "creation_timestamp": "2025-03-11T15:36:59.845273Z"}, {"uuid": "899b236a-136f-4b12-bbab-5480bb8c8e2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27017", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/7333", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-27017\n\ud83d\udd25 CVSS Score: 6.9 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/S:P/AU:Y/R:U/V:C/RE:L/U:Green)\n\ud83d\udd39 Description: Apache NiFi 1.13.0 through 2.2.0 includes the username and password used to authenticate with MongoDB in the NiFi provenance events that MongoDB components generate during processing. An authorized user with read access to the provenance events of those processors may see the credentials information. Upgrading to Apache NiFi 2.3.0 is the recommended mitigation, which removes the credentials from provenance event records.\n\ud83d\udccf Published: 2025-03-12T16:19:45.206Z\n\ud83d\udccf Modified: 2025-03-12T16:19:45.206Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/d4n5474jkhp82dvnht13pjtlfx7bhn5q", "creation_timestamp": "2025-03-12T16:41:12.000000Z"}, {"uuid": "57f5c3c9-903b-4585-a57e-e5dcb3843455", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27017", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lkfkqbwagk23", "content": "", "creation_timestamp": "2025-03-15T07:05:04.324143Z"}]}