Vulnerability Description
DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a JDBC parameter blocklist bypass vulnerability in the MySQL datasource configuration. The Mysql class uses Lombok's @Data annotation, which auto-generates a public setter for the illegalParameters field that contains the JDBC security blocklist. When a datasource configuration is submitted as JSON, Jackson deserialization calls setIllegalParameters with an attacker-supplied empty list, replacing the blocklist before getJdbc() validation runs. This allows an authenticated attacker to include dangerous JDBC parameters such as allowLoadLocalInfile=true, and by pointing the datasource at a rogue MySQL server, exploit the LOAD DATA LOCAL INFILE protocol feature to read arbitrary files from the DataEase server filesystem, including sensitive environment variables and database credentials. This issue has been fixed in version 2.10.21.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dataease | Dataease | < 2.10.21 |
Related Weaknesses (CWE)
References
- https://github.com/dataease/dataease/releases/tag/v2.10.21Release Notes
- https://github.com/dataease/dataease/security/advisories/GHSA-944x-93jf-h3rxExploitThird Party Advisory
FAQ
What is CVE-2026-40899?
CVE-2026-40899 is a vulnerability with a CVSS score of 6.5 (MEDIUM). DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a JDBC parameter blocklist bypass vulnerability in the MySQL datasource configuration. The Mysq...
How severe is CVE-2026-40899?
CVE-2026-40899 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-40899?
Check the references section above for vendor advisories and patch information. Affected products include: Dataease Dataease.