Vulnerability Description
A security flaw has been discovered in h2oai h2o-3 up to 7402. This affects the function importBinaryModel of the file h2o-core/src/main/java/hex/Model.java of the component JAR Handler. Performing a manipulation results in deserialization. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| H2O | H2O | <= 7402 |
Related Weaknesses (CWE)
References
- https://vuldb.com/submit/810107Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/364378Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/364378/ctiPermissions RequiredVDB Entry
- https://vulnplus-note.wetolink.com/share/b5nsQg6EcsBSBroken Link
FAQ
What is CVE-2026-8751?
CVE-2026-8751 is a vulnerability with a CVSS score of 7.3 (HIGH). A security flaw has been discovered in h2oai h2o-3 up to 7402. This affects the function importBinaryModel of the file h2o-core/src/main/java/hex/Model.java of the component JAR Handler. Performing a ...
How severe is CVE-2026-8751?
CVE-2026-8751 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8751?
Check the references section above for vendor advisories and patch information. Affected products include: H2O H2O.