{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T07:49:54.593","vulnerabilities":[{"cve":{"id":"CVE-2025-58457","sourceIdentifier":"security@apache.org","published":"2025-09-24T10:15:28.020","lastModified":"2025-11-04T22:16:34.103","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper permission check in ZooKeeper AdminServer lets authorized clients to run snapshot and restore command with insufficient permissions.\n\nThis issue affects Apache ZooKeeper: from 3.9.0 before 3.9.4.\n\nUsers are recommended to upgrade to version 3.9.4, which fixes the issue.\n\nThe issue can be mitigated by disabling both commands (via admin.snapshot.enabled and admin.restore.enabled), disabling the whole AdminServer interface (via admin.enableServer), or ensuring that the root ACL does not provide open permissions. (Note that ZooKeeper ACLs are not recursive, so this does not impact operations on child nodes besides notifications from recursive watches.)"},{"lang":"es","value":"Una comprobación de permisos incorrecta en el AdminServer de ZooKeeper permite a clientes autorizados ejecutar el comando de instantánea y restauración con permisos insuficientes.\n\nEste problema afecta a Apache ZooKeeper: desde 3.9.0 hasta antes de 3.9.4.\n\nSe recomienda a los usuarios actualizar a la versión 3.9.4, que corrige el problema.\n\nEl problema puede mitigarse deshabilitando ambos comandos (a través de admin.snapshot.enabled y admin.restore.enabled), deshabilitando toda la interfaz del AdminServer (a través de admin.enableServer), o asegurando que la ACL raíz no proporcione permisos abiertos. (Nótese que las ACL de ZooKeeper no son recursivas, por lo que esto no impacta las operaciones en nodos hijos, además de las notificaciones de los observadores recursivos.)"}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-280"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:zookeeper:*:*:*:*:*:*:*:*","versionStartIncluding":"3.9.0","versionEndExcluding":"3.9.4","matchCriteriaId":"B539F7ED-4D4B-476C-949D-743BC3BB3118"}]}]}],"references":[{"url":"https://lists.apache.org/thread/r5yol0kkhx2fzw22pxk1ozwm3oc6yxrx","source":"security@apache.org","tags":["Mailing List","Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2025/09/24/10","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}