CVE-2025-6544

A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
Configurations

Configuration 1 (hide)

cpe:2.3:a:h2o:h2o:*:*:*:*:*:*:*:*

History

08 Oct 2025, 20:05

Type Values Removed Values Added
CPE cpe:2.3:a:h2o:h2o:*:*:*:*:*:*:*:*
First Time H2o
H2o h2o
References () https://github.com/h2oai/h2o-3/commit/0298ee348f5c73673b7b542158081e79605f5f25 - () https://github.com/h2oai/h2o-3/commit/0298ee348f5c73673b7b542158081e79605f5f25 - Patch
References () https://huntr.com/bounties/53f35a0f-d644-4f82-93aa-89fe7e0aed40 - () https://huntr.com/bounties/53f35a0f-d644-4f82-93aa-89fe7e0aed40 - Exploit, Third Party Advisory

22 Sep 2025, 18:15

Type Values Removed Values Added
References () https://huntr.com/bounties/53f35a0f-d644-4f82-93aa-89fe7e0aed40 - () https://huntr.com/bounties/53f35a0f-d644-4f82-93aa-89fe7e0aed40 -

21 Sep 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-21 09:15

Updated : 2025-10-08 20:05


NVD link : CVE-2025-6544

Mitre link : CVE-2025-6544

CVE.ORG link : CVE-2025-6544


JSON object : View

Products Affected

h2o

  • h2o
CWE
CWE-502

Deserialization of Untrusted Data