CVE-2025-48999

DataEase is an open source business intelligence and data visualization tool. A bypass of CVE-2025-46566's patch exists in versions prior to 2.10.10. In a malicious payload, `getUrlType()` retrieves `hostName`. Since the judgment statement returns false, it will not enter the if statement and will not be filtered. The payload can be directly concatenated at the replace location to construct a malicious JDBC statement. Version 2.10.10 contains a patch for the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*

History

05 Jun 2025, 14:07

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-03 21:15

Updated : 2025-06-05 14:07


NVD link : CVE-2025-48999

Mitre link : CVE-2025-48999

CVE.ORG link : CVE-2025-48999


JSON object : View

Products Affected

dataease

  • dataease
CWE
CWE-284

Improper Access Control

CWE-923

Improper Restriction of Communication Channel to Intended Endpoints

NVD-CWE-noinfo