Home

Description

DataEase is a data visualization and analytics platform. In DataEase versions through 2.10.13, a JDBC driver bypass vulnerability exists in the H2 database connection handler. The getJdbc function in H2.java checks if the jdbcUrl starts with jdbc:h2 but returns a separate jdbc field as the actual connection URL. An attacker can provide a jdbcUrl that starts with jdbc:h2 while supplying a different jdbc field with an arbitrary JDBC driver and connection string. This allows an authenticated attacker to trigger arbitrary JDBC connections with malicious drivers, potentially leading to remote code execution. The vulnerability is fixed in version 2.10.14. No known workarounds exist.

PUBLISHED Reserved 2025-10-13 | Published 2025-10-17 | Updated 2025-10-17 | Assigner GitHub_M




HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-502: Deserialization of Untrusted Data

Product status

< 2.10.14
affected

References

github.com/...taease/security/advisories/GHSA-7wcv-j6gc-qc7q

github.com/...ommit/bb320e42bf2cf862b9c4b438c1517547b53ed67b

cve.org (CVE-2025-62420)

nvd.nist.gov (CVE-2025-62420)

Download JSON