Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2025-59390
November 26, 2025
Apache Druid’s Kerberos authenticator uses a weak fallback secret when the "druid.auth.authenticator.kerberos.cookieSignatureSecret" configuration is not explicitly set. In this case, the secret is generated using "ThreadLocalRandom", which is not a crypto-graphically secure random number generator. This may allow an attacker to predict or brute force the secret used to sign authentication cookies, potentially enabling token forgery or authentication bypass. Additionally, each process generates its own fallback secret, resulting in inconsistent secrets across nodes. This causes authentication failures in distributed or multi-broker deployments, effectively leading to a incorrectly configured clusters. Users are advised to configure a strong "druid.auth.authenticator.kerberos.cookieSignatureSecret" This issue affects Apache Druid: through 34.0.0. Users are recommended to upgrade to version 35.0.0, which fixes the issue making it mandatory to set "druid.auth.authenticator.kerberos.cookieSignatureSecret" when using the Kerberos authenticator. Services will fail to come up if the secret is not set.
Affected Packages
https://github.com/apache/druid.git (GITHUB):
Affected version(s) >=druid-0.1.0 <druid-35.0.0
Fix Suggestion:
Update to version druid-35.0.0
org.apache.druid.extensions:druid-kerberos (JAVA):
Affected version(s) >=0.13.0-incubating <35.0.0
Fix Suggestion:
Update to version 35.0.0
Do you need more information?
Contact Us
CVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
6.5
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
EPSS
Base Score:
0.07