CVE-2025-46762

Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code. While 1.15.1 introduced a fix to restrict untrusted packages, the default setting of trusted packages still allows malicious classes from these packages to be executed. The exploit is only applicable if the client code of parquet-avro uses the "specific" or the "reflect" models deliberately for reading Parquet files. ("generic" model is not impacted) Users are recommended to upgrade to 1.15.2 or set the system property "org.apache.parquet.avro.SERIALIZABLE_PACKAGES" to an empty string on 1.15.1. Both are sufficient to fix the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:parquet:*:*:*:*:*:*:*:*

History

13 May 2025, 20:25

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-06 10:15

Updated : 2025-05-13 20:25


NVD link : CVE-2025-46762

Mitre link : CVE-2025-46762

CVE.ORG link : CVE-2025-46762


JSON object : View

Products Affected

apache

  • parquet
CWE
CWE-73

External Control of File Name or Path

NVD-CWE-noinfo