CVE-2025-6544
BaseFortify
Publication date: 2025-09-21
Last updated on: 2025-10-08
Assigner: huntr.dev
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| h2o | h2o | From 3.0.0.2 (inc) to 3.46.0.8 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a deserialization flaw in h2oai/h2o-3 versions up to 3.46.0.8. It occurs due to improper handling of JDBC connection parameters, which attackers can exploit by bypassing regular expression checks and using double URL encoding. This allows attackers to read arbitrary system files and execute arbitrary code on the affected system.
How can this vulnerability impact me? :
The vulnerability can have severe impacts including unauthorized reading of system files and execution of arbitrary code. This can lead to full system compromise, data theft, data loss, and disruption of services for all users of the affected versions.