Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.livy/livy-server
  4. ›
  5. CVE-2025-60012

CVE-2025-60012: Apache Livy: Restrict file access

March 13, 2026 (updated March 16, 2026)

Malicious configuration can lead to unauthorized file access in Apache Livy.

This issue affects Apache Livy 0.7.0 and 0.8.0 when connecting to Apache Spark 3.1 or later.

A request that includes a Spark configuration value supported from Apache Spark version 3.1 can lead to users gaining access to files they do not have permissions to.

For the vulnerability to be exploitable, the user needs to have access to Apache Livy’s REST or JDBC interface and be able to send requests with arbitrary Spark configuration values.

Users are recommended to upgrade to version 0.9.0 or later, which fixes the issue.

References

  • github.com/advisories/GHSA-hm8x-rpgg-7855
  • github.com/apache/incubator-livy
  • lists.apache.org/thread/gpc85fwrgrbglpk9gm8tmcjzqnctx64w
  • nvd.nist.gov/vuln/detail/CVE-2025-60012

Code Behaviors & Features

Detect and mitigate CVE-2025-60012 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.7.0-incubating before 0.9.0-incubating

Fixed versions

  • 0.9.0-incubating

Solution

Upgrade to version 0.9.0-incubating or above.

Impact 6.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation

Source file

maven/org.apache.livy/livy-server/CVE-2025-60012.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:42 +0000.