CVE-2022-39362: CWE-356: Product UI does not Warn User of Unsafe Actions in metabase metabase
Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9, unsaved SQL queries are auto-executed, which could pose a possible attack vector. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase no longer automatically executes ad-hoc native queries. Now the native editor shows the query and gives the user the option to manually run the query if they want.
AI Analysis
Technical Summary
CVE-2022-39362 is a medium-severity vulnerability affecting multiple versions of Metabase, a popular open-source data visualization and business intelligence platform. The core issue lies in the product's user interface behavior prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9, where unsaved SQL queries were automatically executed without explicit user consent. This behavior violates the principle of safe user interaction, categorized under CWE-356 (Product UI does not warn user of unsafe actions). Specifically, when users input ad-hoc native SQL queries in the Metabase query editor, the system would execute these queries automatically even if the user had not explicitly run them. This automatic execution could lead to unintended data exposure, data manipulation, or performance degradation, especially if the queries are complex or maliciously crafted. The vulnerability arises from the lack of a warning or confirmation prompt before executing potentially unsafe or unreviewed SQL commands. The issue has been addressed in the patched versions by changing the UI behavior: the native query editor now displays the query and requires the user to manually trigger execution, thereby preventing accidental or unintended query runs. There are no known exploits in the wild reported for this vulnerability, and no direct patch links were provided in the source information. The vulnerability affects a broad range of Metabase versions, including all versions prior to 0.41.9 and various incremental versions up to but not including the patched releases. Since Metabase is widely used for data analytics and visualization, this vulnerability could be leveraged by attackers who gain access to a Metabase instance to execute arbitrary SQL queries without user confirmation, potentially leading to data leakage or unauthorized data manipulation.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those relying on Metabase for critical business intelligence and data analytics. Unauthorized or unintended execution of SQL queries could lead to exposure of sensitive data, including personal data protected under GDPR, financial information, or proprietary business intelligence. This could result in compliance violations, reputational damage, and financial penalties. Additionally, maliciously crafted queries could degrade database performance or cause denial of service conditions, impacting availability of analytics services. Organizations in sectors such as finance, healthcare, government, and telecommunications that use Metabase for data visualization are at higher risk due to the sensitivity of their data. The vulnerability also increases the attack surface if an attacker gains limited access to the Metabase UI, as they could execute harmful queries without additional authentication or user interaction beyond accessing the interface. However, since exploitation requires access to the Metabase interface, the risk is somewhat mitigated by existing access controls. Still, insider threats or compromised credentials could enable exploitation. The lack of user warnings increases the likelihood of accidental data exposure by legitimate users as well, which could lead to inadvertent data breaches.
Mitigation Recommendations
European organizations should prioritize upgrading Metabase to the latest patched versions (0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, or 1.41.9 and above) to eliminate the automatic execution of unsaved SQL queries. Beyond patching, organizations should implement strict access controls to limit who can access the Metabase query editor, ideally restricting it to trusted users with a clear need for query execution privileges. Implementing multi-factor authentication (MFA) for Metabase access can reduce the risk of credential compromise. Monitoring and logging query execution activities within Metabase can help detect unusual or unauthorized query runs. Organizations should also conduct user training to raise awareness about safe query practices and the importance of reviewing queries before execution. Where possible, segregate environments so that ad-hoc query execution is restricted to development or testing environments, not production. Additionally, database-level permissions should be tightly controlled to limit the impact of any unauthorized query execution, for example by using read-only database users for Metabase connections where feasible. Finally, consider implementing network segmentation and firewall rules to restrict access to Metabase instances from untrusted networks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
CVE-2022-39362: CWE-356: Product UI does not Warn User of Unsafe Actions in metabase metabase
Description
Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9, unsaved SQL queries are auto-executed, which could pose a possible attack vector. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase no longer automatically executes ad-hoc native queries. Now the native editor shows the query and gives the user the option to manually run the query if they want.
AI-Powered Analysis
Technical Analysis
CVE-2022-39362 is a medium-severity vulnerability affecting multiple versions of Metabase, a popular open-source data visualization and business intelligence platform. The core issue lies in the product's user interface behavior prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9, where unsaved SQL queries were automatically executed without explicit user consent. This behavior violates the principle of safe user interaction, categorized under CWE-356 (Product UI does not warn user of unsafe actions). Specifically, when users input ad-hoc native SQL queries in the Metabase query editor, the system would execute these queries automatically even if the user had not explicitly run them. This automatic execution could lead to unintended data exposure, data manipulation, or performance degradation, especially if the queries are complex or maliciously crafted. The vulnerability arises from the lack of a warning or confirmation prompt before executing potentially unsafe or unreviewed SQL commands. The issue has been addressed in the patched versions by changing the UI behavior: the native query editor now displays the query and requires the user to manually trigger execution, thereby preventing accidental or unintended query runs. There are no known exploits in the wild reported for this vulnerability, and no direct patch links were provided in the source information. The vulnerability affects a broad range of Metabase versions, including all versions prior to 0.41.9 and various incremental versions up to but not including the patched releases. Since Metabase is widely used for data analytics and visualization, this vulnerability could be leveraged by attackers who gain access to a Metabase instance to execute arbitrary SQL queries without user confirmation, potentially leading to data leakage or unauthorized data manipulation.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, particularly for those relying on Metabase for critical business intelligence and data analytics. Unauthorized or unintended execution of SQL queries could lead to exposure of sensitive data, including personal data protected under GDPR, financial information, or proprietary business intelligence. This could result in compliance violations, reputational damage, and financial penalties. Additionally, maliciously crafted queries could degrade database performance or cause denial of service conditions, impacting availability of analytics services. Organizations in sectors such as finance, healthcare, government, and telecommunications that use Metabase for data visualization are at higher risk due to the sensitivity of their data. The vulnerability also increases the attack surface if an attacker gains limited access to the Metabase UI, as they could execute harmful queries without additional authentication or user interaction beyond accessing the interface. However, since exploitation requires access to the Metabase interface, the risk is somewhat mitigated by existing access controls. Still, insider threats or compromised credentials could enable exploitation. The lack of user warnings increases the likelihood of accidental data exposure by legitimate users as well, which could lead to inadvertent data breaches.
Mitigation Recommendations
European organizations should prioritize upgrading Metabase to the latest patched versions (0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, or 1.41.9 and above) to eliminate the automatic execution of unsaved SQL queries. Beyond patching, organizations should implement strict access controls to limit who can access the Metabase query editor, ideally restricting it to trusted users with a clear need for query execution privileges. Implementing multi-factor authentication (MFA) for Metabase access can reduce the risk of credential compromise. Monitoring and logging query execution activities within Metabase can help detect unusual or unauthorized query runs. Organizations should also conduct user training to raise awareness about safe query practices and the importance of reviewing queries before execution. Where possible, segregate environments so that ad-hoc query execution is restricted to development or testing environments, not production. Additionally, database-level permissions should be tightly controlled to limit the impact of any unauthorized query execution, for example by using read-only database users for Metabase connections where feasible. Finally, consider implementing network segmentation and firewall rules to restrict access to Metabase instances from untrusted networks.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf4987
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 2:37:51 PM
Last updated: 8/2/2025, 1:18:50 PM
Views: 13
Related Threats
CVE-2025-54992: CWE-611: Improper Restriction of XML External Entity Reference in telstra open-kilda
MediumCVE-2025-55012: CWE-288: Authentication Bypass Using an Alternate Path or Channel in zed-industries zed
HighCVE-2025-8854: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in bulletphysics bullet3
HighCVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCVE-2025-54878: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.