Home

Description

The Uniffle HTTP client is configured to trust all SSL certificates and disables hostname verification by default. This insecure configuration exposes all REST API communication between the Uniffle CLI/client and the Uniffle Coordinator service to potential Man-in-the-Middle (MITM) attacks. This issue affects all versions from before 0.10.0. Users are recommended to upgrade to version 0.10.0, which fixes the issue.

PUBLISHED Reserved 2025-12-20 | Published 2026-01-07 | Updated 2026-01-07 | Assigner apache

Problem types

CWE-297 Improper Validation of Certificate with Host Mismatch

Product status

Default status
unaffected

Any version before 0.10.0
affected

Credits

omkar parkhe. finder

References

www.openwall.com/lists/oss-security/2025/12/27/2

lists.apache.org/thread/trvdd11hmpbjno3t8rc9okr4t036ox2v vendor-advisory

cve.org (CVE-2025-68637)

nvd.nist.gov (CVE-2025-68637)

Download JSON