Home

Description

SQL injection vulnerability in Hive Metastore Server (HMS) when processing delete column statistics requests via the Thrift APIs. The vulnerability is only exploitable by trusted/authorized users/applications that are allowed to call directly the Thrift APIs. In most real-world deployments, HMS is accessible to only a handful of applications (e.g., Hiveserver2) thus the vulnerability is not exploitable. Moreover, the vulnerable code cannot be reached when metastore.try.direct.sql property is set to false. This issue affects Apache Hive: from 4.1.0 before 4.2.0. Users are recommended to upgrade to version 4.2.0, which fixes the issue. Users who cannot upgrade directly are encouraged to set metastore.try.direct.sql property to false if the HMS Thrift APIs are exposed to general public.

PUBLISHED Reserved 2025-10-21 | Published 2025-11-26 | Updated 2025-12-01 | Assigner apache

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

4.1.0 (semver) before 4.2.0
affected

Credits

WuKong (Tencent) finder

References

www.openwall.com/lists/oss-security/2025/11/26/3

lists.apache.org/thread/yj65dd8dmzgy8p3nv8zy33v8knzg9o7g vendor-advisory

cve.org (CVE-2025-62728)

nvd.nist.gov (CVE-2025-62728)

Download JSON