GHSA-c399-q49h-qwc8

Suggest an improvement
Source
https://github.com/advisories/GHSA-c399-q49h-qwc8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-c399-q49h-qwc8/GHSA-c399-q49h-qwc8.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-c399-q49h-qwc8
Aliases
Published
2026-01-19T09:30:27Z
Modified
2026-02-03T03:16:49.310052Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Apache Linkis: Arbitrary File Read via Double URL Encoding Bypass
Details

A vulnerability in Apache Linkis.

Problem Description

When using the JDBC engine and data source functionality, if the URL parameter configured on the frontend has undergone multiple rounds of URL encoding, it may bypass the system's checks. This bypass can trigger a vulnerability that allows unauthorized access to system files via JDBC parameters.

Scope of Impact

This issue affects Apache Linkis: from 1.3.0 through 1.7.0.

Severity level

moderate Solution Continuously check if the connection information contains the "%" character; if it does, perform URL decoding.

Users are recommended to upgrade to version 1.8.0, which fixes the issue.

More questions about this vulnerability can be discussed here:  https://lists.apache.org/list?dev@linkis.apache.org:2025-9:cve

Database specific
{
    "nvd_published_at": "2026-01-19T09:16:01Z",
    "github_reviewed_at": "2026-01-21T01:03:19Z",
    "cwe_ids": [
        "CWE-177",
        "CWE-20"
    ],
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

Maven / org.apache.linkis:linkis

Package

Name
org.apache.linkis:linkis
View open source insights on deps.dev
Purl
pkg:maven/org.apache.linkis/linkis

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.3.0
Fixed
1.8.0

Affected versions

1.*
1.3.0
1.3.1
1.3.2
1.4.0
1.5.0
1.6.0
1.7.0

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/01/GHSA-c399-q49h-qwc8/GHSA-c399-q49h-qwc8.json"