Seatunnel Apache Seatunnel

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Apache Seatunnel.

By the Year

In 2026 there have been 0 vulnerabilities in Apache Seatunnel. Last year, in 2025 Seatunnel had 1 security vulnerability published. Right now, Seatunnel is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 1 0.00
2024 2 7.50

It may take a day or so for new Seatunnel vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Apache Seatunnel Security Vulnerabilities

Arbitrary File Read & Deserialization in SeaTunnel <=2.3.10
CVE-2025-32896 - June 19, 2025

# Summary Unauthorized users can perform Arbitrary File Read and Deserialization attack by submit job using restful api-v1. # Details Unauthorized users can access `/hazelcast/rest/maps/submit-job` to submit job. An attacker can set extra params in mysql url to perform Arbitrary File Read and Deserialization attack. This issue affects Apache SeaTunnel: <=2.3.10 # Fixed Users are recommended to upgrade to version 2.3.11, and enable restful api-v2 & open https two-way authentication , which fixes the issue.

Missing Authentication for Critical Function

Apache SeaTunnel 1.0.0: Read-File via MySQL URL Parameters (before 1.0.1)
CVE-2023-49198 7.5 - High - August 21, 2024

Mysql security vulnerability in Apache SeaTunnel. Attackers can read files on the MySQL server by modifying the information in the MySQL URL allowLoadLocalInfile=true&allowUrlInLocalInfile=true&allowLoadLocalInfileInPath=/&maxAllowedPacket=655360 This issue affects Apache SeaTunnel: 1.0.0. Users are recommended to upgrade to version [1.0.1], which fixes the issue.

Files or Directories Accessible to External Parties

Apache SeaTunnel 1.0.0 Hardcoded JWT Secret Allows Auth Bypass (Fixed in 1.0.1)
CVE-2023-48396 - July 30, 2024

Web Authentication vulnerability in Apache SeaTunnel. Since the jwt key is hardcoded in the application, an attacker can forge any token to log in any user. Attacker can get secret key in /seatunnel-server/seatunnel-app/src/main/resources/application.yml and then create a token. This issue affects Apache SeaTunnel: 1.0.0. Users are recommended to upgrade to version 1.0.1, which fixes the issue.

Authentication Bypass by Spoofing

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Apache Seatunnel or by Apache? Click the Watch button to subscribe.

Apache
Vendor

subscribe