CVE-2025-29847
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
19/01/2026
Last modified:
19/01/2026
Description
A vulnerability in Apache Linkis.<br />
<br />
Problem Description<br />
When using the JDBC engine and da<br />
When using the JDBC engine and data source functionality, if the URL parameter configured on the frontend has undergone multiple rounds of URL encoding, it may bypass the system&#39;s checks. This bypass can trigger a vulnerability that allows unauthorized access to system files via JDBC parameters.<br />
<br />
Scope of Impact<br />
<br />
<br />
This issue affects Apache Linkis: from 1.3.0 through 1.7.0.<br />
<br />
Severity level<br />
<br />
<br />
moderate<br />
Solution<br />
Continuously check if the connection information contains the "%" character; if it does, perform URL decoding.<br />
<br />
Users are recommended to upgrade to version 1.8.0, which fixes the issue.<br />
<br />
<br />
<br />
<br />
More questions about this vulnerability can be discussed here: https://lists.apache.org/list?dev@linkis.apache.org:2025-9:cve



