CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-27103: Dataease Mysql JDBC Connection Parameters Not Being Verified Leads to Arbitrary File Read Vulnerability​

7.3 CVSS

Description

DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.6, a bypass for the patch for CVE-2024-55953 allows authenticated users to read and deserialize arbitrary files through the background JDBC connection. The vulnerability has been fixed in v2.10.6. No known workarounds are available.

Classification

CVE ID: CVE-2025-27103

CVSS Base Severity: HIGH

CVSS Base Score: 7.3

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P

Problem Types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE-862: Missing Authorization

Affected Products

Vendor: dataease

Product: dataease

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.03% (probability of being exploited)

EPSS Percentile: 5.81% (scored less or equal to compared to others)

EPSS Date: 2025-04-11 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-27103
https://github.com/dataease/dataease/security/advisories/GHSA-v4gg-8rp3-ccjx

Timeline