Cyber Posture

CVE-2025-29847

High

Published: 19 January 2026

Published
19 January 2026
Modified
27 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0012 30.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-29847 is a high-severity Improper Input Validation (CWE-20) vulnerability in Apache Linkis. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-20 CWE-22

Directly implements checks on information inputs to reject invalid data before processing.

addresses: CWE-20

Security testing and developer training directly verify and enforce proper input validation, reducing exploitability of injection and malformed-data weaknesses.

addresses: CWE-20

Security testing and evaluation at multiple SDLC stages directly detects missing or flawed input validation, with the required remediation process ensuring fixes are applied.

addresses: CWE-20

Spam protection mechanisms perform filtering and detection on inbound/outbound messages, directly compensating for missing or weak input validation of unsolicited content.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Path traversal in public-facing Apache Linkis JDBC component directly enables remote unauthenticated file read (T1190 exploitation + T1005 data collection).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability in Apache Linkis. Problem Description When using the JDBC engine and da When using the JDBC engine and data source functionality, if the URL parameter configured on the frontend has undergone multiple rounds of URL encoding, it may…

more

bypass the system's checks. This bypass can trigger a vulnerability that allows unauthorized access to system files via JDBC parameters. Scope of Impact This issue affects Apache Linkis: from 1.3.0 through 1.7.0. Severity level moderate Solution Continuously check if the connection information contains the "%" character; if it does, perform URL decoding. Users are recommended to upgrade to version 1.8.0, which fixes the issue. More questions about this vulnerability can be discussed here: https://lists.apache.org/list?dev@linkis.apache.org:2025-9:cve

Deeper analysisAI

CVE-2025-29847 is a vulnerability in Apache Linkis that affects versions from 1.3.0 through 1.7.0. It occurs in the JDBC engine and data source functionality, where a frontend-configured URL parameter that has undergone multiple rounds of URL encoding can bypass system checks. This bypass enables unauthorized access to system files through JDBC parameters. The issue is associated with CWE-20 (Improper Input Validation) and CWE-22 (Path Traversal), with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), rated as moderate severity.

Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction required. By crafting a specially encoded JDBC URL parameter, attackers bypass validation and gain unauthorized read access to system files, resulting in high confidentiality impact without affecting integrity or availability.

Apache Linkis advisories recommend upgrading to version 1.8.0, which addresses the issue. As a mitigation, systems should continuously check connection information for the "%" character and perform URL decoding if present. Additional discussion is available at https://lists.apache.org/list?dev@linkis.apache.org:2025-9:cve, with further details in references such as https://lists.apache.org/thread/03l5rfkgdt022o75jp8x4tzpqxz8g057 and http://www.openwall.com/lists/oss-security/2025/09/19/2.

Details

CWE(s)

Affected Products

apache
linkis
1.3.0 — 1.8.0

CVEs Like This One

CVE-2025-50151Same vendor: Apache
CVE-2025-66518Same vendor: Apache
CVE-2026-22444Same vendor: Apache
CVE-2026-24308Same vendor: Apache
CVE-2025-68493Same vendor: Apache
CVE-2025-48913Same vendor: Apache
CVE-2025-23195Same vendor: Apache
CVE-2026-24735Same vendor: Apache
CVE-2025-27553Same vendor: Apache
CVE-2026-24734Same vendor: Apache

References