Cyber Posture

CVE-2025-58046

CriticalPublic PoCRCE

Published: 15 September 2025

Published
15 September 2025
Modified
19 September 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0164 82.1th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-58046 is a critical-severity Injection (CWE-74) vulnerability in Dataease Dataease. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 17.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the insufficient filtering flaw in the Impala getJdbc method by applying patches such as those in Dataease version 2.10.13.

prevent

Enforces validation and sanitization of JDBC connection string inputs to block malicious JNDI injection payloads.

detect

Monitors software integrity to detect unauthorized changes resulting from RMI deserialization and remote command execution.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote unauthenticated RCE via malicious JDBC/JNDI input in public-facing Dataease web app directly matches T1190 Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Dataease is an open-source data visualization and analysis platform. In versions up to and including 2.10.12, the Impala data source is vulnerable to remote code execution due to insufficient filtering in the getJdbc method of the io.dataease.datasource.type.Impala class. Attackers can…

more

construct malicious JDBC connection strings that exploit JNDI injection and trigger RMI deserialization, ultimately enabling remote command execution. The vulnerability can be exploited by editing the data source and providing a crafted JDBC connection string that references a remote configuration file, leading to RMI-based deserialization attacks. This issue has been patched in version 2.10.13. It is recommended to upgrade to the latest version. No known workarounds exist for affected versions.

Deeper analysisAI

CVE-2025-58046 is a remote code execution vulnerability affecting Dataease, an open-source data visualization and analysis platform, in versions up to and including 2.10.12. The issue resides in the Impala data source implementation, specifically due to insufficient filtering in the getJdbc method of the io.dataease.datasource.type.Impala class. This flaw allows attackers to craft malicious JDBC connection strings that exploit JNDI injection, triggering RMI deserialization and enabling remote command execution. It is associated with CWE-74 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-502 (Deserialization of Untrusted Data), with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Any unauthenticated remote attacker can exploit this vulnerability by editing a data source configuration within Dataease and supplying a specially crafted JDBC connection string that references a remote configuration file. This leads to JNDI-based RMI deserialization attacks, allowing arbitrary command execution on the server hosting the vulnerable Dataease instance.

The vulnerability has been addressed in Dataease version 2.10.13 through a patch visible in GitHub commit 8d04e92d44e1bac9284e9e64df5afd7f96d9373c, as detailed in the project's security advisory GHSA-mvwc-x8x9-46c3. Administrators are advised to upgrade to the latest version immediately, as no workarounds are available for affected releases.

Details

CWE(s)

Affected Products

dataease
dataease
≤ 2.10.13

CVEs Like This One

CVE-2025-58748Same product: Dataease Dataease
CVE-2025-64428Same product: Dataease Dataease
CVE-2025-64164Same product: Dataease Dataease
CVE-2025-58045Same product: Dataease Dataease
CVE-2025-27138Same product: Dataease Dataease
CVE-2026-33082Same product: Dataease Dataease
CVE-2024-57707Same product: Dataease Dataease
CVE-2026-33083Same product: Dataease Dataease
CVE-2024-56511Same product: Dataease Dataease
CVE-2026-32140Same product: Dataease Dataease

References