CVE-2025-58046
Published: 15 September 2025
Summary
CVE-2025-58046 is a critical-severity Injection (CWE-74) vulnerability in Dataease Dataease. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the insufficient filtering flaw in the Impala getJdbc method by applying patches such as those in Dataease version 2.10.13.
Enforces validation and sanitization of JDBC connection string inputs to block malicious JNDI injection payloads.
Monitors software integrity to detect unauthorized changes resulting from RMI deserialization and remote command execution.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated RCE via malicious JDBC/JNDI input in public-facing Dataease web app directly matches T1190 Exploit Public-Facing Application.
NVD Description
Dataease is an open-source data visualization and analysis platform. In versions up to and including 2.10.12, the Impala data source is vulnerable to remote code execution due to insufficient filtering in the getJdbc method of the io.dataease.datasource.type.Impala class. Attackers can…
more
construct malicious JDBC connection strings that exploit JNDI injection and trigger RMI deserialization, ultimately enabling remote command execution. The vulnerability can be exploited by editing the data source and providing a crafted JDBC connection string that references a remote configuration file, leading to RMI-based deserialization attacks. This issue has been patched in version 2.10.13. It is recommended to upgrade to the latest version. No known workarounds exist for affected versions.
Deeper analysisAI
CVE-2025-58046 is a remote code execution vulnerability affecting Dataease, an open-source data visualization and analysis platform, in versions up to and including 2.10.12. The issue resides in the Impala data source implementation, specifically due to insufficient filtering in the getJdbc method of the io.dataease.datasource.type.Impala class. This flaw allows attackers to craft malicious JDBC connection strings that exploit JNDI injection, triggering RMI deserialization and enabling remote command execution. It is associated with CWE-74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-502 (Deserialization of Untrusted Data), with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Any unauthenticated remote attacker can exploit this vulnerability by editing a data source configuration within Dataease and supplying a specially crafted JDBC connection string that references a remote configuration file. This leads to JNDI-based RMI deserialization attacks, allowing arbitrary command execution on the server hosting the vulnerable Dataease instance.
The vulnerability has been addressed in Dataease version 2.10.13 through a patch visible in GitHub commit 8d04e92d44e1bac9284e9e64df5afd7f96d9373c, as detailed in the project's security advisory GHSA-mvwc-x8x9-46c3. Administrators are advised to upgrade to the latest version immediately, as no workarounds are available for affected releases.
Details
- CWE(s)