CVE-2024-52279
low-risk
Published 2025-08-03
Improper Input Validation vulnerability in Apache Zeppelin. The fix for JDBC URL validation in CVE-2024-31864 did not account for URL encoded input. This issue affects Apache Zeppelin: from 0.11.1 before 0.12.0. Users are recommended to upgrade to version 0.12.0, which fixes the issue.
Do I need to act?
-
0.39% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (5)
Issue Tracking
https://github.com/apache/zeppelin/pull/4838
Issue Tracking
https://issues.apache.org/jira/browse/ZEPPELIN-6095
Vendor Advisory
https://lists.apache.org/thread/dxb98vgrb21rrl3k0fzonpk66onr6o4q
Not Applicable
https://www.cve.org/CVERecord?id=CVE-2024-31864
27
/ 100
low-risk
Severity
21/34 · High
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal