Vulnerability Description
A deserialization vulnerability exists in the H2O-3 REST API (POST /99/ImportSQLTable) that affects all versions up to 3.46.0.7. This vulnerability allows remote code execution (RCE) due to improper validation of JDBC connection parameters when using a Key-Value format. The vulnerability is present in the MySQL JDBC Driver version 8.0.19 and JDK version 8u112. The issue is resolved in version 3.46.0.8.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://github.com/h2oai/h2o-3/commit/f714edd6b8429c7a7211b779b6ec108a95b7382d
- https://huntr.com/bounties/057a743b-b2ec-4312-8262-ce0ff8bc161c
FAQ
What is CVE-2025-5662?
CVE-2025-5662 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A deserialization vulnerability exists in the H2O-3 REST API (POST /99/ImportSQLTable) that affects all versions up to 3.46.0.7. This vulnerability allows remote code execution (RCE) due to improper v...
How severe is CVE-2025-5662?
CVE-2025-5662 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-5662?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.