Code Execution Vulnerability in Apache Parquet Product by Apache
CVE-2025-30065
Key Information:
- Vendor
- Apache
- Status
- Vendor
- CVE Published:
- 1 April 2025
Badges
What is CVE-2025-30065?
CVE-2025-30065 is a vulnerability found in the Apache Parquet product, specifically in its parquet-avro module. This open-source data processing framework is widely utilized to ensure efficient columnar storage and management, particularly in big data analytics applications. The identified issue allows malicious actors to execute arbitrary code, which can have serious implications for organizations relying on Apache Parquet for data handling. If exploited, this vulnerability jeopardizes the integrity and security of sensitive data, potentially leading to substantial operational disruptions and data breaches.
Technical Details
The vulnerability occurs due to inadequate schema parsing in versions 1.15.0 and earlier of the parquet-avro module within Apache Parquet. This flaw enables attackers to manipulate how data schemas are processed, leading to the possibility of executing unauthorized code on affected systems. Users are strongly encouraged to upgrade to version 1.15.1, which addresses these security concerns.
Potential Impact of CVE-2025-30065
-
Arbitrary Code Execution: The primary risk associated with this vulnerability is the ability for attackers to execute arbitrary code on affected systems. This can lead to unauthorized access to system resources, sensitive data manipulation, or even full system compromise.
-
Data Breaches: Given the utilization of Apache Parquet in data-intensive environments, an exploit could lead to unauthorized access to confidential information, resulting in severe data breaches that may violate compliance regulations and erode customer trust.
-
Operational Disruption: Exploiting this vulnerability can hinder an organization's operations by disrupting data processing tasks. This could potentially lead to downtime or degraded performance in critical analytics workflows, impacting business continuity.
Affected Version(s)
Apache Parquet Java 0 <= 1.15.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
President Trump fires the head of NSA and Cyber Command.
Patch issued for maximum severity flaw affecting Apache Parquet. China-linked threat actor exploits Ivanti Connect Secure vulnerability.
2 weeks ago

Critical Apache Parquet Vulnerability Allows Remote Code Execution
A severe vulnerability has been identified in the Apache Parquet Java library, specifically within its parquet-avro module.
2 weeks ago

Critical Flaw in Apache Parquet Allows Remote Attackers to Execute Arbitrary Code
Apache Parquet flaw CVE-2025-30065 enables remote code execution from crafted files, risking data pipelines.
2 weeks ago
References
CVSS V4
Timeline
- 💰
Used in Ransomware
- 🥇
Vulnerability reached the number 1 worldwide trending spot
- 🟡
Public PoC available
- 📈
Vulnerability started trending
- 👾
Exploit known to exist
- 📰
First article discovered by BleepingComputer
Vulnerability published
Vulnerability Reserved