CVE-2025-9571
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-10

Last updated on: 2025-12-10

Assigner: GoogleCloud

Description
A remote code execution (RCE) vulnerability exists in Google Cloud Data Fusion. A user with permissions to upload artifacts to a Data Fusion instance can execute arbitrary code within the core AppFabric component. This could allow the attacker to gain control over the Data Fusion instance, potentially leading to unauthorized access to sensitive data, modification of data pipelines, and exploration of the underlying infrastructure. The following CDAP versions include the necessary update to protect against this vulnerability: * 6.10.6+ * 6.11.1+ Β Users must immediatelyΒ upgrade to them, or greater ones, available at: https://github.com/cdapio/cdap-build/releases .
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-10
Last Modified
2025-12-10
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
cdapio cdap 6.11.1
google cloud_data_fusion *
cdapio cdap 6.10.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a remote code execution (RCE) issue in Google Cloud Data Fusion. It allows a user who has permissions to upload artifacts to a Data Fusion instance to execute arbitrary code within the core AppFabric component. This means the attacker can potentially take control of the Data Fusion instance.


How can this vulnerability impact me? :

The impact of this vulnerability includes the attacker gaining control over the Data Fusion instance, which could lead to unauthorized access to sensitive data, modification of data pipelines, and exploration of the underlying infrastructure.


What immediate steps should I take to mitigate this vulnerability?

Users must immediately upgrade their CDAP versions to 6.10.6 or higher, or 6.11.1 or higher, to protect against this vulnerability. The updates are available at https://github.com/cdapio/cdap-build/releases.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart