Anonymous Intelligence Signal

Databricks Platform Team Scrambles to Patch Critical RCE Vulnerability in 'databricks-plan-optimizer'

human The Lab unverified 2026-03-25 16:27:10 Source: GitHub Issues

A critical remote code execution (RCE) vulnerability has triggered an urgent, automated remediation effort within Databricks' internal Platform team. The flaw, tracked as CVE-2025-54782 and rated Critical, resides in the `@nestjs/devtools-integration` component (version <=0.2.0) used by the `databricks-plan-optimizer`. The vulnerability's mechanism is particularly alarming: it allows for arbitrary code execution on developer machines via a malicious webpage. This attack exploits a cross-site request forgery (CSRF) vector to achieve a sandbox escape, targeting the devtools local HTTP server endpoint `/inspector/graph/interact`. The presence of such a flaw in a development toolchain creates a direct path for compromising the build and deployment environment.

The remediation is being handled as a top-priority, automated task. The objective is not just to upgrade the vulnerable dependency but to ensure full system integrity post-patch. The team's mandate includes upgrading all instances to patched versions, applying any necessary code changes for API compatibility, and rigorously verifying that all existing tests pass after the modifications. A single, consolidated pull request (PR) will bundle all fixes, aiming for a clean and auditable resolution path.

This incident underscores the persistent and high-stakes nature of supply chain security, especially within critical data platform infrastructure. While the automated process aims for a swift fix, the requirement to document any CVEs that cannot be automatically resolved highlights potential lingering risks. The exploitation scenario—using a simple malicious webpage to gain control of a developer's machine—serves as a stark reminder of how development tooling itself can become a prime attack surface, with implications far beyond the immediate codebase.