The attacker can use the raft server protocol in an unauthenticated way. The attacker can see the server's resources, including directories and files.
This issue affects Apache Zeppelin: from 0.10.1 up to 0.12.0.
Users are recommended to upgrade to version 0.12.0, which fixes the issue by removing the Cluster Interpreter.
{ "github_reviewed": true, "severity": "HIGH", "github_reviewed_at": "2025-07-14T20:31:20Z", "cwe_ids": [ "CWE-664" ], "nvd_published_at": "2025-07-12T17:15:20Z" }