Home

Description

A deserialization vulnerability exists in the H2O-3 REST API (POST /99/ImportSQLTable) that affects all versions up to 3.46.0.7. This vulnerability allows remote code execution (RCE) due to improper validation of JDBC connection parameters when using a Key-Value format. The vulnerability is present in the MySQL JDBC Driver version 8.0.19 and JDK version 8u112. The issue is resolved in version 3.46.0.8.

PUBLISHED Reserved 2025-06-04 | Published 2025-09-02 | Updated 2025-09-02 | Assigner @huntr_ai




CRITICAL: 9.8CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-502 Deserialization of Untrusted Data

Product status

Any version before 3.46.0.8
affected

References

huntr.com/bounties/057a743b-b2ec-4312-8262-ce0ff8bc161c

github.com/...ommit/f714edd6b8429c7a7211b779b6ec108a95b7382d

cve.org (CVE-2025-5662)

nvd.nist.gov (CVE-2025-5662)

Download JSON