Apache Ambari
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Apache Ambari.
By the Year
In 2026 there have been 0 vulnerabilities in Apache Ambari. Last year, in 2025 Ambari had 3 security vulnerabilities published. Right now, Ambari is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 3 | 0.00 |
| 2024 | 3 | 6.50 |
| 2023 | 3 | 7.37 |
| 2022 | 0 | 0.00 |
| 2021 | 2 | 6.80 |
| 2020 | 1 | 6.50 |
| 2019 | 0 | 0.00 |
| 2018 | 2 | 0.00 |
It may take a day or so for new Ambari vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Apache Ambari Security Vulnerabilities
Ambari RCE in Alert Definition Script Injection
CVE-2025-23196
- January 21, 2025
A code injection vulnerability exists in the Ambari Alert Definition feature, allowing authenticated users to inject and execute arbitrary shell commands. The vulnerability arises when defining alert scripts, where the script filename field is executed using `sh -c`. An attacker with authenticated access can exploit this vulnerability to inject malicious commands, leading to remote code execution on the server. The issue has been fixed in the latest versions of Ambari.
Command Injection
Ambari/Oozie 2.x XXE Vulnerability (fixed in 2.7.9)
CVE-2025-23195
- January 21, 2025
An XML External Entity (XXE) vulnerability exists in the Ambari/Oozie project, allowing an attacker to inject malicious XML entities. This vulnerability occurs due to insecure parsing of XML input using the `DocumentBuilderFactory` class without disabling external entity resolution. An attacker can exploit this vulnerability to read arbitrary files on the server or perform server-side request forgery (SSRF) attacks. The issue has been fixed in both Ambari 2.7.9 and the trunk branch.
XXE
Ambari RCE via Alert Script Injection
CVE-2024-51941
- January 21, 2025
A remote code injection vulnerability exists in the Ambari Metrics and AMS Alerts feature, allowing authenticated users to inject and execute arbitrary code. The vulnerability occurs when processing alert definitions, where malicious input can be injected into the alert script execution path. An attacker with authenticated access can exploit this vulnerability to execute arbitrary commands on the server. The issue has been fixed in the latest versions of Ambari.
Command Injection
XSS Vulnerability in Apache Ambari < 2.7.8 (Input Validation)
CVE-2023-50378
- March 01, 2024
Lack of proper input validation and constraint enforcement in Apache Ambari prior to 2.7.8 Impact : As it will be stored XSS, Could be exploited to perform unauthorized actions, varying from data access to session hijacking and delivering malicious payloads. Users are recommended to upgrade to version 2.7.8 which fixes this issue.
XSS
Apache Ambari 2.7.7 or earlier XXE injection
CVE-2023-50380
6.5 - Medium
- February 27, 2024
XML External Entity injection in apache ambari versions <= 2.7.7, Users are recommended to upgrade to version 2.7.8, which fixes this issue. More Details: Oozie Workflow Scheduler had a vulnerability that allowed for root-level file reading and privilege escalation from low-privilege users. The vulnerability was caused through lack of proper user input validation. This vulnerability is known as an XML External Entity (XXE) injection attack. Attackers can exploit XXE vulnerabilities to read arbitrary files on the server, including sensitive system files. In theory, it might be possible to use this to escalate privileges.
XXE
Apache Ambari 2.7.8 Code Injection Vulnerability (CVE-2023-50379)
CVE-2023-50379
- February 27, 2024
Malicious code injection in Apache Ambari in prior to 2.7.8. Users are recommended to upgrade to version 2.7.8, which fixes this issue. Impact: A Cluster Operator can manipulate the request by adding a malicious code injection and gain a root over the cluster main host.
Code Injection
Apache Ambari 2.7.0-2.7.6 SpringEL Injection RCE via Metrics Source
CVE-2022-45855
8.8 - High
- July 12, 2023
SpringEL injection in the metrics source in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7.
EL Injection
SpringEL Injection in Apache Ambari Agent 2.7.0-2.7.6 Remote Code Execution
CVE-2022-42009
8.8 - High
- July 12, 2023
SpringEL injection in the server agent in Apache Ambari version 2.7.0 to 2.7.6 allows a malicious authenticated user to execute arbitrary code remotely. Users are recommended to upgrade to 2.7.7.
EL Injection
Azure Ambari Auth Spoofing Vulnerability
CVE-2023-23408
4.5 - Medium
- March 14, 2023
Azure Apache Ambari Spoofing Vulnerability
In Apache Ambari versions 2.6.2.2 and earlier, malicious users
CVE-2020-13924
7.5 - High
- March 17, 2021
In Apache Ambari versions 2.6.2.2 and earlier, malicious users can construct file names for directory traversal and traverse to other directories to download files.
Directory traversal
A cross-site scripting issue was found in Apache Ambari Views
CVE-2020-1936
6.1 - Medium
- March 02, 2021
A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4.
XSS
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks
CVE-2020-5421
6.5 - Medium
- September 19, 2020
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
Apache Ambari
CVE-2018-8042
- July 18, 2018
Apache Ambari, version 2.5.0 to 2.6.2, passwords for Hadoop credential stores are exposed in Ambari Agent informational log messages when the credential store feature is enabled for eligible services. For example, Hive and Oozie.
Apache Ambari, versions 1.4.0 to 2.6.1, is susceptible to a directory traversal attack allowing an unauthenticated user to craft an HTTP request which provides read-only access to any file on the filesystem of the host the Ambari Server runs on
CVE-2018-8003
- May 03, 2018
Apache Ambari, versions 1.4.0 to 2.6.1, is susceptible to a directory traversal attack allowing an unauthenticated user to craft an HTTP request which provides read-only access to any file on the filesystem of the host the Ambari Server runs on that is accessible by the user the Ambari Server is running as. Direct network access to the Ambari Server is required to issue this request, and those Ambari Servers that are protected behind a firewall, or in a restricted network zone are at less risk of being affected by this issue.
In Ambari 2.2.2 through 2.4.2 and Ambari 2.5.0, sensitive data may be stored on disk in temporary files on the Ambari Server host
CVE-2017-5655
- May 15, 2017
In Ambari 2.2.2 through 2.4.2 and Ambari 2.5.0, sensitive data may be stored on disk in temporary files on the Ambari Server host. The temporary files are readable by any user authenticated on the host.
In Ambari 2.4.x (before 2.4.3) and Ambari 2.5.0
CVE-2017-5654
- May 12, 2017
In Ambari 2.4.x (before 2.4.3) and Ambari 2.5.0, an authorized user of the Ambari Hive View may be able to gain unauthorized read access to files on the host where the Ambari server executes.
During installation of Ambari 2.4.0 through 2.4.2
CVE-2017-5642
- April 03, 2017
During installation of Ambari 2.4.0 through 2.4.2, Ambari Server artifacts are not created with proper ACLs.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Apache Ambari or by Apache? Click the Watch button to subscribe.