Description

Apache has disclosed a critical security vulnerability in Apache Druid, a widely used real-time analytics database designed for OLAP dashboards and fast aggregation APIs. This vulnerability, tracked as CVE-2025-27888, impacts versions prior to 31.0.2 and 32.0.1. The flaw is a combination of Server-Side Request Forgery (SSRF), Cross-Site Scripting (XSS), and Open Redirect vulnerabilities. Although an attacker must be authenticated to exploit the issue, its risk is heightened by the fact that the management proxy is enabled by default in Druid’s out-of-the-box configuration. The vulnerability poses a significant security threat as it can lead to various malicious outcomes. Exploiting the flaw could allow attackers to redirect users to phishing websites, steal authentication tokens, or even perform Cross-Site Request Forgery (XSRF) attacks. This is especially concerning for deployments with external access or multi-user environments, as attackers could inject malicious scripts or redirect users to compromised pages. The default state of the management proxy further amplifies the risk for organizations who may not be aware of the vulnerability. To mitigate this risk, Apache recommends all users upgrade to Druid versions 31.0.2 or 32.0.1. Disabling the management proxy can reduce the exposure to this vulnerability, but this may break certain features in the web console. Therefore, organizations are urged to prioritize upgrading to the latest versions of Druid to fully protect against CVE-2025-27888 and ensure the security of their real-time analytics platforms.