Remote Code Execution Bypass in DataEase Open Source Tool
CVE-2025-57772

8.2HIGH

Key Information:

Vendor

Dataease

Status
Vendor
CVE Published:
25 August 2025

What is CVE-2025-57772?

DataEase, an open-source business intelligence and data visualization tool, has a vulnerability that allows for a bypass of the H2 JDBC filter. Specifically, prior to version 2.10.12, if the JDBC URL satisfies certain criteria, the getJdbcUrl method can be exploited to return the H2 JDBC URL. This effectively circumvents the filtering logic put in place by H2, enabling an attacker to specify the H2 driver for the JDBC connection. The issue has been addressed in version 2.10.12, and users are advised to upgrade to this version or later to mitigate risks associated with this vulnerability.

Affected Version(s)

dataease < 2.10.12

References

CVSS V4

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-57772 : Remote Code Execution Bypass in DataEase Open Source Tool