The Uniffle HTTP client is configured to trust all SSL certificates and disables hostname verification by default. This insecure configuration exposes all REST API communication between the Uniffle CLI/client and the Uniffle Coordinator service to potential Man-in-the-Middle (MITM) attacks. This issue affects all versions from before 0.10.0. Users are recommended to upgrade to version 0.10.0, which fixes the issue.
History

Thu, 08 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache uniffle
Vendors & Products Apache
Apache uniffle

Wed, 07 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
References

Wed, 07 Jan 2026 10:00:00 +0000

Type Values Removed Values Added
Description The Uniffle HTTP client is configured to trust all SSL certificates and disables hostname verification by default. This insecure configuration exposes all REST API communication between the Uniffle CLI/client and the Uniffle Coordinator service to potential Man-in-the-Middle (MITM) attacks. This issue affects all versions from before 0.10.0. Users are recommended to upgrade to version 0.10.0, which fixes the issue.
Title Apache Uniffle: Insecure SSL Configuration in Uniffle HTTP Client
Weaknesses CWE-297
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-01-07T14:40:51.284Z

Reserved: 2025-12-20T12:17:41.989Z

Link: CVE-2025-68637

cve-icon Vulnrichment

Updated: 2026-01-07T10:07:22.470Z

cve-icon NVD

Status : Received

Published: 2026-01-07T12:17:05.860

Modified: 2026-01-07T15:15:45.997

Link: CVE-2025-68637

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-08T09:49:22Z