Cyber Posture

CVE-2025-2787

HighRCE

Published: 26 March 2025

Published
26 March 2025
Modified
08 October 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0051 66.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2787 is a high-severity Code Injection (CWE-94) vulnerability in Knime Business Hub. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked in the top 33.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-5 (Security Alerts, Advisories, and Directives).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely identification, reporting, and correction of flaws like the ingress-nginx code injection vulnerability (CVE-2025-1974) in KNIME Business Hub via patching to recommended versions.

prevent

Requires receiving, disseminating, and acting on vendor security advisories such as KNIME's for CVE-2025-2787, including updates and workarounds to prevent exploitation.

detect

Enables periodic vulnerability scanning to identify the presence of CVE-2025-1974 in the ingress-nginx component used by KNIME Business Hub deployments.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The code injection vulnerability enables RCE on the ingress-nginx pod from within the Kubernetes cluster (requiring authenticated internal access), directly facilitating exploitation of remote services for code execution and privilege escalation potentially leading to full cluster takeover.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

KNIME Business Hub is affected by the Ingress-nginx CVE-2025-1974 ( a.k.a IngressNightmare ) vulnerability which affects the ingress-nginx component. In the worst case a complete takeover of the Kubernetes cluster is possible. Since the affected component is only reachable from…

more

within the cluster, i.e. requires an authenticated user, the severity in the context of KNIME Business Hub is slightly lower. Besides applying the publicly known workarounds, we strongly recommend updating to one of the following versions of KNIME Business Hub: * 1.13.3 or above * 1.12.4 or above * 1.11.4 or above * 1.10.4 or above *

Deeper analysisAI

CVE-2025-2787 affects KNIME Business Hub deployments through its use of the ingress-nginx component, which is vulnerable to CVE-2025-1974, also known as IngressNightmare. This code injection vulnerability, classified under CWE-94, carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The issue stems from the ingress-nginx controller's handling of certain configurations, enabling remote code execution within the Kubernetes environment where KNIME Business Hub operates.

Exploitation requires an authenticated user with access from within the Kubernetes cluster, limiting the attack surface compared to fully public exposures. A successful attack could allow the adversary to achieve remote code execution on the ingress-nginx pod, potentially leading to a complete takeover of the Kubernetes cluster in the worst case. While the cluster-internal reachability slightly reduces the contextual severity for KNIME Business Hub, the high-impact potential warrants immediate attention.

The KNIME security advisory recommends applying publicly known workarounds for CVE-2025-1974 alongside updating to patched versions of KNIME Business Hub: 1.13.3 or later, 1.12.4 or later, 1.11.4 or later, or 1.10.4 or later. Full details are available at https://www.knime.com/security-advisory-cve-2025-2787.

Details

CWE(s)

Affected Products

knime
business hub
1.10.0 — 1.10.4 · 1.11.0 — 1.11.4 · 1.12.0 — 1.12.4

CVEs Like This One

CVE-2025-3019Same product: Knime Business Hub
CVE-2025-2402Same product: Knime Business Hub
CVE-2025-48984Shared CWE-94
CVE-2025-42880Shared CWE-94
CVE-2026-25817Shared CWE-94
CVE-2025-42950Shared CWE-94
CVE-2026-24516Shared CWE-94
CVE-2025-42957Shared CWE-94
CVE-2025-25943Shared CWE-94
CVE-2025-63421Shared CWE-94

References