CVE-2025-48999: Dataease Redshift Data Source JDBC Connection Parameters Not Verified Leads to RCE Vulnerability

8.8 CVSS

Description

DataEase is an open source business intelligence and data visualization tool. A bypass of CVE-2025-46566's patch exists in versions prior to 2.10.10. In a malicious payload, `getUrlType()` retrieves `hostName`. Since the judgment statement returns false, it will not enter the if statement and will not be filtered. The payload can be directly concatenated at the replace location to construct a malicious JDBC statement. Version 2.10.10 contains a patch for the issue.

Classification

CVE ID: CVE-2025-48999

CVSS Base Severity: HIGH

CVSS Base Score: 8.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem Types

CWE-923: Improper Restriction of Communication Channel to Intended Endpoints CWE-284: Improper Access Control

Affected Products

Vendor: dataease

Product: dataease

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 10.96% (scored less or equal to compared to others)

EPSS Date: 2025-06-06 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-48999
https://github.com/dataease/dataease/security/advisories/GHSA-6pq2-6q8x-mp2r
https://github.com/dataease/dataease/commit/03b18db8a0fb7e9dc2c44f6d26d8c6221b7748c4

Timeline