A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
References
| Link | Resource |
|---|---|
| https://github.com/h2oai/h2o-3/commit/0298ee348f5c73673b7b542158081e79605f5f25 | Patch |
| https://huntr.com/bounties/53f35a0f-d644-4f82-93aa-89fe7e0aed40 | Exploit Third Party Advisory |
| https://huntr.com/bounties/53f35a0f-d644-4f82-93aa-89fe7e0aed40 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-09-21 09:15
Updated : 2025-10-08 20:05
NVD link : CVE-2025-6544
Mitre link : CVE-2025-6544
CVE.ORG link : CVE-2025-6544
JSON object : View
Products Affected
h2o
- h2o
CWE
CWE-502
Deserialization of Untrusted Data
