CVE-2025-10702
BaseFortify
Publication date: 2025-11-19
Last updated on: 2025-11-19
Assigner: Progress Software Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| progress | data_direct_openaccess_jdbc_driver | * |
| progress | data_direct_hybrid_data_pipeline_jdbc_driver | * |
| progress | data_direct_connect_for_jdbc | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Code Injection issue in Progress DataDirect JDBC drivers and Hybrid Data Pipeline. It arises from an undocumented syntax in the SpyAttribute connection option that, if exploited, allows an attacker to load and execute arbitrary code by specifying a crafted value. This can happen if an application permits end users to set the SpyAttributes option, enabling remote code execution through loading arbitrary classes.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to execute arbitrary code remotely on the system using the affected JDBC drivers. This can lead to unauthorized control over the application or system, potentially resulting in data breaches, system compromise, or further attacks within the environment.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the affected Progress DataDirect Connect for JDBC drivers, DataDirect Hybrid Data Pipeline JDBC driver, and DataDirect OpenAccess JDBC driver to the fixed versions listed in the CVE description. Specifically, upgrade to versions at or above the fixed versions for your respective driver (e.g., DataDirect Connect for JDBC for Amazon Redshift to 6.0.0.001541 or later). Avoid allowing end users to specify values for the SpyAttributes connection option, as this can be exploited for remote code execution.