Impact
Apache IoTDB suffers from an improper input validation flaw that allows attackers to inject malicious JEXL expressions through query inputs. The injection vulnerability may enable manipulation of the server’s processing of expressions, potentially exposing the database to unauthorized processing of user‑supplied data. The flaw is rooted in the CWE‑20 and CWE‑917 weaknesses.
Affected Systems
Affected installations include Apache IoTDB versions 1.0.0 through 1.3.6 and all releases from 2.0.0 up to 2.0.6. Users of these version ranges are vulnerable and need remediation before deploying new features or data ingestion pipelines.
Risk and Exploitability
The vulnerability has a CVSS score of 9.8, indicating critical severity, but its EPSS score is less than 1%, suggesting a low likelihood of exploitation in the wild. It is not currently listed in the CISA KEV catalog. Attackers could send crafted queries containing malicious JEXL syntax over the network, assuming they have query access. If successful, the injected expression could affect the server’s processing, though the exact impact is not specified in the advisory.
OpenCVE Enrichment
Github GHSA