CVE-2025-6544
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-21

Last updated on: 2025-10-08

Assigner: huntr.dev

Description
A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-21
Last Modified
2025-10-08
Generated
2026-05-07
AI Q&A
2025-09-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
h2o h2o From 3.0.0.2 (inc) to 3.46.0.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a deserialization flaw in h2oai/h2o-3 versions up to 3.46.0.8. It occurs due to improper handling of JDBC connection parameters, which attackers can exploit by bypassing regular expression checks and using double URL encoding. This allows attackers to read arbitrary system files and execute arbitrary code on the affected system.


How can this vulnerability impact me? :

The vulnerability can have severe impacts including unauthorized reading of system files and execution of arbitrary code. This can lead to full system compromise, data theft, data loss, and disruption of services for all users of the affected versions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart