Home

Description

DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.12, there is a H2 JDBC RCE bypass in DataEase. If the JDBC URL meets criteria, the getJdbcUrl method is returned, which acts as the getter for the JdbcUrl parameter provided. This bypasses H2's filtering logic and returns the H2 JDBC URL, allowing the "driver":"org.h2.Driver" to specify the H2 driver for the JDBC connection. The vulnerability has been fixed in version 2.10.12.

PUBLISHED Reserved 2025-08-19 | Published 2025-08-25 | Updated 2025-08-25 | Assigner GitHub_M




HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 2.10.12
affected

References

github.com/...taease/security/advisories/GHSA-v37q-vh67-9rqv

github.com/...ommit/1644d81dff46272b09570fa1f4a8f83f01f37440

cve.org (CVE-2025-57772)

nvd.nist.gov (CVE-2025-57772)

Download JSON