The Uniffle HTTP client is configured to trust all SSL certificates and
disables hostname verification by default. This insecure configuration
exposes all REST API communication between the Uniffle CLI/client and the
Uniffle Coordinator service to potential Man-in-the-Middle (MITM) attacks.
This issue affects all versions from before 0.10.0.
Users are recommended to upgrade to version 0.10.0, which fixes the issue.
References
| Link | Resource |
|---|---|
| https://lists.apache.org/thread/trvdd11hmpbjno3t8rc9okr4t036ox2v | Mailing List Vendor Advisory Issue Tracking |
| http://www.openwall.com/lists/oss-security/2025/12/27/2 | Mailing List Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-07 12:17
Updated : 2026-01-16 14:34
NVD link : CVE-2025-68637
Mitre link : CVE-2025-68637
CVE.ORG link : CVE-2025-68637
JSON object : View
Products Affected
apache
- uniffle
CWE
CWE-297
Improper Validation of Certificate with Host Mismatch
