A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
History

Wed, 08 Oct 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared H2o
H2o h2o
CPEs cpe:2.3:a:h2o:h2o:*:*:*:*:*:*:*:*
Vendors & Products H2o
H2o h2o

Mon, 22 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 22 Sep 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared H2oai
H2oai h2o-3
Vendors & Products H2oai
H2oai h2o-3

Sun, 21 Sep 2025 09:15:00 +0000

Type Values Removed Values Added
Description A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
Title Deserialization Vulnerability in h2oai/h2o-3
Weaknesses CWE-502
References
Metrics cvssV3_0

{'score': 9.8, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: @huntr_ai

Published:

Updated: 2025-09-22T17:23:25.409Z

Reserved: 2025-06-23T18:25:36.504Z

Link: CVE-2025-6544

cve-icon Vulnrichment

Updated: 2025-09-22T17:23:16.843Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-21T09:15:38.497

Modified: 2025-10-08T20:05:02.450

Link: CVE-2025-6544

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-22T09:58:47Z