CVE-2026-22754 Affecting apache-nifi package, versions <2.9.0-r3


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-WOLFILATEST-APACHENIFI-16423644
  • published5 May 2026
  • disclosed22 Apr 2026

Introduced: 22 Apr 2026

NewCVE-2026-22754  (opens in a new tab)

How to fix?

Upgrade Wolfi apache-nifi to version 2.9.0-r3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream apache-nifi package and not the apache-nifi package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

Vulnerability in Spring Spring Security. If an application uses <sec:intercept-url servlet-path="/servlet-path" pattern="/endpoint/**"/> to define the servlet path for computing a path matcher, then the servlet path is not included and the related authorization rules are not exercised. This can lead to an authorization bypass.This issue affects Spring Security: from 7.0.0 through 7.0.4.

CVSS Base Scores

version 3.1