A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
References
Configurations
No configuration.
History
22 Sep 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://huntr.com/bounties/53f35a0f-d644-4f82-93aa-89fe7e0aed40 - |
21 Sep 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-21 09:15
Updated : 2025-09-22 21:23
NVD link : CVE-2025-6544
Mitre link : CVE-2025-6544
CVE.ORG link : CVE-2025-6544
JSON object : View
Products Affected
No product.
CWE
CWE-502
Deserialization of Untrusted Data