CVE-2025-68637

The Uniffle HTTP client is configured to trust all SSL certificates and disables hostname verification by default. This insecure configuration exposes all REST API communication between the Uniffle CLI/client and the Uniffle Coordinator service to potential Man-in-the-Middle (MITM) attacks. This issue affects all versions from before 0.10.0. Users are recommended to upgrade to version 0.10.0, which fixes the issue.
References
Link Resource
https://lists.apache.org/thread/trvdd11hmpbjno3t8rc9okr4t036ox2v Mailing List Vendor Advisory Issue Tracking
http://www.openwall.com/lists/oss-security/2025/12/27/2 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:uniffle:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-07 12:17

Updated : 2026-01-16 14:34


NVD link : CVE-2025-68637

Mitre link : CVE-2025-68637

CVE.ORG link : CVE-2025-68637


JSON object : View

Products Affected

apache

  • uniffle
CWE
CWE-297

Improper Validation of Certificate with Host Mismatch