A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
Metrics
Affected Vendors & Products
References
History
Mon, 22 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 22 Sep 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
H2oai
H2oai h2o-3 |
|
Vendors & Products |
H2oai
H2oai h2o-3 |
Sun, 21 Sep 2025 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions. | |
Title | Deserialization Vulnerability in h2oai/h2o-3 | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-09-22T17:23:25.409Z
Reserved: 2025-06-23T18:25:36.504Z
Link: CVE-2025-6544

Updated: 2025-09-22T17:23:16.843Z

Status : Awaiting Analysis
Published: 2025-09-21T09:15:38.497
Modified: 2025-09-22T21:23:01.543
Link: CVE-2025-6544

No data.