CVE-2025-62703

Fugue · Fugue Multiple Products

A high-severity vulnerability has been identified in multiple Fugue products, which could allow a remote, unauthenticated attacker to execute arbitrary code on the underlying distributed computing env.

Executive summary

A high-severity vulnerability has been identified in multiple Fugue products, which could allow a remote, unauthenticated attacker to execute arbitrary code on the underlying distributed computing environments like Spark, Dask, or Ray. Successful exploitation could lead to a complete compromise of the computing cluster, resulting in sensitive data theft, system manipulation, and significant disruption to data processing operations. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this critical risk.

Vulnerability

The vulnerability exists due to improper input sanitization within the Fugue interface when processing user-submitted code or data for execution on distributed backends. An attacker can craft a malicious payload, such as a specially formed Python script or SQL query, and submit it to the Fugue system. When Fugue distributes this job to a backend like Spark, Dask, or Ray, the unsanitized payload is executed, leading to arbitrary code execution with the privileges of the service account running the distributed computing worker nodes.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8, posing a significant threat to the organization. Successful exploitation could grant an attacker full control over the distributed computing clusters, leading to severe consequences including the exfiltration of sensitive or proprietary data being processed, manipulation or corruption of critical datasets, and a complete denial-of-service by shutting down the computing environment. These impacts could result in major financial loss, regulatory penalties, reputational damage, and a loss of customer trust.

Remediation

Immediate Action: Apply the security updates released by the vendor across all affected Fugue instances without delay. After patching, carefully review access and application logs for any signs of compromise or unusual job submissions that may have occurred prior to the update.

Proactive Monitoring: Implement enhanced monitoring on Fugue and the associated distributed computing clusters. Security teams should look for anomalous job submissions, unexpected network connections originating from worker nodes, and the execution of suspicious processes (e.g., shell commands, network scanners) on the cluster infrastructure.

Compensating Controls: If immediate patching is not feasible, restrict network access to the Fugue interface to only trusted IP addresses and subnets. Consider deploying a Web Application Firewall (WAF) with rules designed to inspect and block malformed or suspicious code submissions intended for the Fugue engine.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the critical risk of remote code execution, we strongly recommend that organizations prioritize the immediate deployment of the vendor-supplied patches. Although this vulnerability is not currently listed on the CISA KEV catalog, its severity warrants an urgent response. The potential for complete system compromise makes patching the most critical and effective mitigation strategy.