CVE-2026-33725
Received Received - Intake
Remote Code Execution via SQL Injection in Metabase Enterprise Serialization

Publication date: 2026-03-27

Last updated on: 2026-04-01

Assigner: GitHub, Inc.

Description
Metabase is an open source business intelligence and embedded analytics tool. In Metabase Enterprise prior to versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4, authenticated admins on Metabase Enterprise Edition can achieve Remote Code Execution (RCE) and Arbitrary File Read via the `POST /api/ee/serialization/import` endpoint. A crafted serialization archive injects an `INIT` property into the H2 JDBC spec, which can execute arbitrary SQL during a database sync. We confirmed this was possible on Metabase Cloud. This only affects Metabase Enterprise. Metabase OSS lacks the affected codepaths. All versions of Metabase Enterprise that have serialization, which dates back to at least version 1.47, are affected. Metabase Enterprise versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4 patch the issue. As a workaround, disable the serialization import endpoint in their Metabase instance to prevent access to the vulnerable codepaths.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-03-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
metabase metabase to 1.54.22 (exc)
metabase metabase From 1.55.0 (inc) to 1.55.22 (exc)
metabase metabase From 1.56.0 (inc) to 1.56.22 (exc)
metabase metabase From 1.57.0 (inc) to 1.57.16 (exc)
metabase metabase From 1.58.0 (inc) to 1.58.10 (exc)
metabase metabase From 1.59.0 (inc) to 1.59.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-33725 is a high-severity vulnerability in Metabase Enterprise Edition versions prior to 1.59.x that have serialization functionality. Authenticated administrators can exploit this vulnerability via the POST /api/ee/serialization/import endpoint by submitting a crafted serialization archive.

The crafted archive injects an INIT property into the H2 JDBC specification, which allows execution of arbitrary SQL commands during a database synchronization process. This can lead to Remote Code Execution (RCE) on the underlying system.

The attack involves two steps: first, writing a malicious Clojure payload, and then executing it to run operating system commands. Additionally, attackers can perform arbitrary file reads by using crafted YAML that exfiltrates files accessible by the JVM process through an HTTP callback.

This vulnerability only affects Metabase Enterprise Edition; the open-source version does not contain the vulnerable code paths.


How can this vulnerability impact me? :

This vulnerability can have serious impacts including Remote Code Execution (RCE), which allows an attacker with admin privileges to execute arbitrary commands on the server hosting Metabase Enterprise.

Attackers can also read arbitrary files accessible by the JVM process, potentially exposing sensitive data.

The compromise of confidentiality, integrity, and availability of the system is possible, as indicated by the CVSS score metrics.

If exploited, this could lead to full system compromise, data breaches, and disruption of business intelligence services.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized or suspicious POST requests to the /api/ee/serialization/import endpoint on Metabase Enterprise Edition instances.

Since the attack requires authenticated admin access, reviewing access logs for unusual admin activity or unexpected serialization import attempts is recommended.

Specific commands to detect exploitation attempts are not provided in the available resources.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to disable the serialization import endpoint (/api/ee/serialization/import) in your Metabase Enterprise instance to prevent access to the vulnerable code paths.

Additionally, upgrading Metabase Enterprise to one of the patched versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, or 1.59.4 is strongly recommended to fully address the vulnerability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows authenticated administrators to perform Remote Code Execution (RCE) and Arbitrary File Read attacks, which can lead to unauthorized access to sensitive data and compromise system integrity and availability.

Such unauthorized access and potential data breaches could impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of sensitive personal and health information, ensuring confidentiality, integrity, and availability of data.

If exploited, this vulnerability could result in exposure or manipulation of protected data, thereby violating regulatory requirements and potentially leading to legal and financial consequences.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart