CVE-2025-58457
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-24

Last updated on: 2025-11-04

Assigner: Apache Software Foundation

Description
Improper permission check in ZooKeeper AdminServer lets authorized clients to run snapshot and restore command with insufficient permissions. This issue affects Apache ZooKeeper: from 3.9.0 before 3.9.4. Users are recommended to upgrade to version 3.9.4, which fixes the issue. The issue can be mitigated by disabling both commands (via admin.snapshot.enabled and admin.restore.enabled), disabling the whole AdminServer interface (via admin.enableServer), or ensuring that the root ACL does not provide open permissions. (Note that ZooKeeper ACLs are not recursive, so this does not impact operations on child nodes besides notifications from recursive watches.)
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-24
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-09-24
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apache zookeeper From 3.9.0 (inc) to 3.9.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-280 The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an improper permission check in the ZooKeeper AdminServer that allows authorized clients to run snapshot and restore commands without having sufficient permissions. It affects Apache ZooKeeper versions from 3.9.0 up to but not including 3.9.4.


How can this vulnerability impact me? :

The vulnerability can allow authorized clients to execute snapshot and restore commands without proper permissions, potentially leading to unauthorized data access or modification within the ZooKeeper service. This could compromise the integrity and availability of the data managed by ZooKeeper.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading Apache ZooKeeper to version 3.9.4 or later. Alternatively, you can disable the snapshot and restore commands by setting admin.snapshot.enabled and admin.restore.enabled to false, disable the entire AdminServer interface by setting admin.enableServer to false, or ensure that the root ACL does not provide open permissions to restrict unauthorized access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart