We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30371

Metabase vulnerable to circumvention of local link access protection in GeoJson endpoint



Description

Metabase is a business intelligence and embedded analytics tool. Versions prior to v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8 are vulnerable to circumvention of local link access protection in GeoJson endpoint. Self hosted Metabase instances that are using the GeoJson feature could be potentially impacted if their Metabase is colocated with other unsecured resources. This is fixed in v0.52.16.4, v1.52.16.4, v0.53.8, and v1.53.8. Migrating to Metabase Cloud or redeploying Metabase in a dedicated subnet with strict outbound port controls is an available workaround.

Reserved 2025-03-21 | Published 2025-03-28 | Updated 2025-03-28 | Assigner GitHub_M


LOW: 2.1CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N

Problem types

CWE-59: Improper Link Resolution Before File Access ('Link Following')

Product status

< 0.52.16.4
affected

< 1.52.16.4
affected

< 0.53.8
affected

< 1.53.8
affected

References

github.com/...tabase/security/advisories/GHSA-8xf9-9jc8-qp98

cve.org (CVE-2025-30371)

nvd.nist.gov (CVE-2025-30371)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30371

Support options

Helpdesk Chat, Email, Knowledgebase