A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
History

Mon, 22 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 22 Sep 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared H2oai
H2oai h2o-3
Vendors & Products H2oai
H2oai h2o-3

Sun, 21 Sep 2025 09:15:00 +0000

Type Values Removed Values Added
Description A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
Title Deserialization Vulnerability in h2oai/h2o-3
Weaknesses CWE-502
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2025-09-22T17:23:25.409Z

Reserved: 2025-06-23T18:25:36.504Z

Link: CVE-2025-6544

cve-icon Vulnrichment

Updated: 2025-09-22T17:23:16.843Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-21T09:15:38.497

Modified: 2025-09-22T21:23:01.543

Link: CVE-2025-6544

cve-icon Redhat

No data.