Home

Description

DataEase is a data visualization and analytics platform. In DataEase versions through 2.10.13, a JDBC URL injection vulnerability exists in the DB2 and MongoDB data source configuration handlers. In the DB2 data source handler, when the extraParams field is empty, the HOSTNAME, PORT, and DATABASE values are directly concatenated into the JDBC URL without filtering illegal parameters. This allows an attacker to inject a malicious JDBC string into the HOSTNAME field to bypass previously patched vulnerabilities CVE-2025-57773 and CVE-2025-58045. The vulnerability is fixed in version 2.10.14. No known workarounds exist.

PUBLISHED Reserved 2025-10-13 | Published 2025-10-17 | Updated 2025-10-17 | Assigner GitHub_M




HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

< 2.10.14
affected

References

github.com/...taease/security/advisories/GHSA-x4x9-mjcf-99r9

github.com/...ommit/bb320e42bf2cf862b9c4b438c1517547b53ed67b

cve.org (CVE-2025-62419)

nvd.nist.gov (CVE-2025-62419)

Download JSON