

CVE-2025-49715 – Microsoft Dynamics 365 Vulnerability
June 20, 2025
Cloudflare Tunnels Abused to Deliver Python Malware – Active IOCs
June 20, 2025
CVE-2025-49715 – Microsoft Dynamics 365 Vulnerability
June 20, 2025
Cloudflare Tunnels Abused to Deliver Python Malware – Active IOCs
June 20, 2025Severity
High
Analysis Summary
A critical security vulnerability (CVE-2025-32896) has been identified in Apache SeaTunnel, a widely used distributed data integration platform. This flaw affects versions 2.3.1 through 2.3.10 and was disclosed on April 12, 2025. It allows unauthorized users to perform arbitrary file read operations and launch deserialization attacks through the platform's RESTful API interface. The vulnerability stems from weak access controls in the /hazelcast/rest/maps/submit-job endpoint, which lacks proper authentication, exposing systems to potential remote code execution (RCE) threats.
The flaw specifically relates to how SeaTunnel handles job submissions through its API-v1 interface. By exploiting the insecure endpoint, attackers can manipulate MySQL connection parameters via specially crafted URLs. These URLs can inject malicious payloads that trigger both arbitrary file access and deserialization vulnerabilities. The underlying mechanism involves submitting malicious serialized Java objects, which, if deserialized by the system, can lead to arbitrary code execution and complete takeover of the targeted instance.
Security researcher, who discovered the flaw, highlighted that the vulnerability can be exploited without authentication if the attacker has network access to the exposed SeaTunnel instance and API-v1 is enabled (which it is by default). The attack is further facilitated if HTTPS two-way authentication is not implemented, removing an essential layer of defense. The vulnerability has been given a CVSS score high, indicating high severity due to its potential for remote exploitation and system compromise.
To mitigate the issue, the Apache SeaTunnel team has released version 2.3.11, which introduces enhanced authentication and input validation measures. All organizations using vulnerable versions are urged to upgrade immediately. Additionally, administrators are advised to enable the more secure API-v2 interface and implement HTTPS two-way authentication. These steps significantly reduce the attack surface by requiring mutual certificate validation between clients and servers and by enforcing stricter request handling within the RESTful API.
Impact
- Remote Code Execution
- Gain Access
Indicators of Compromise
CVE
CVE-2025-32896
Affected Vendors
Affected Products
- Apache SeaTunnel versions 2.3.1 through 2.3.10
Remediation
- Upgrade to the latest version of Apache SeaTunnel (2.3.11 or later), available from the Apache Website.
- Disable API-v1 or restrict access to the /hazelcast/rest/maps/submit-job endpoint.
- Enable RESTful API-v2, which includes improved authentication and security mechanisms.
- Implement HTTPS two-way authentication to enforce mutual certificate validation between client and server.
- Restrict network access to SeaTunnel instances to trusted sources only.
- Monitor and log all API interactions for unusual or unauthorized behavior.
- Review and sanitize user input, especially URL parameters used in job submissions.
- Perform a full security audit of all SeaTunnel configurations and deployment settings.