CVE-2025-70829
Information Exposure in Datart v1.0.0-rc.3 via H2 JDBC String
Publication date: 2026-02-17
Last updated on: 2026-02-23
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| running-elephant | datart | 1.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2025-70829 is an information exposure vulnerability in Datart version 1.0.0-rc.3 that allows authenticated attackers to access sensitive internal data by exploiting the application's handling of custom H2 JDBC connection strings."}, {'type': 'paragraph', 'content': 'Attackers can create a malicious data source within the Datart dashboard by configuring a custom H2 JDBC URL pointing to the internal database file. After logging in, they navigate to the Data Source section, create and test this malicious data source, and then use SQL editor or chart tools to execute arbitrary SQL queries on the internal database.'}, {'type': 'paragraph', 'content': 'This allows attackers to retrieve sensitive information such as user credentials (including password hashes) and configuration details of other connected data sources. The password hashes can be used to forge valid JWT tokens to impersonate any user, including administrators, because the application uses a hardcoded secret key for JWT signing.'}, {'type': 'paragraph', 'content': 'Additionally, attackers can decrypt AES-encrypted configuration fields containing plaintext credentials for external databases using the same hardcoded key.'}] [1]
How can this vulnerability impact me? :
This vulnerability can lead to significant security breaches by exposing sensitive internal data to authenticated attackers.
- Attackers can access user credentials, including password hashes.
- They can forge JWT tokens to impersonate any user, including administrators, gaining unauthorized access and control.
- Attackers can obtain configuration details and plaintext credentials for external databases connected to Datart.
Overall, this can compromise the confidentiality, integrity, and availability of the Datart system and any connected data sources.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by verifying if an authenticated user can create a custom H2 JDBC data source within the Datart dashboard that points to the internal database file.'}, {'type': 'paragraph', 'content': 'Specifically, after logging into Datart, check if it is possible to navigate to the "Data Source" section, create a new H2 data source with a JDBC URL like `jdbc:h2:file:./bin/h2/datart.demo;MODE=MySQL`, test the connection, and save it.'}, {'type': 'paragraph', 'content': 'If this is possible, the system is vulnerable because it allows execution of arbitrary SQL queries on the internal database.'}, {'type': 'paragraph', 'content': 'Commands or steps to detect exploitation include attempting to create such a data source and running SQL queries to access sensitive tables such as `user` or `source`.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting authenticated users from creating or modifying H2 JDBC data sources that point to internal database files.
Additionally, review and remove or limit permissions that allow users to add custom data sources or execute arbitrary SQL queries within the Datart dashboard.
Consider changing the hardcoded JWT secret key and avoid using predictable or hardcoded keys for signing tokens.
If possible, update or patch Datart to a version where this vulnerability is fixed.