Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5986: CWE-73 External Control of File Name or Path in h2oai h2oai/h2o-3

0
Critical
VulnerabilityCVE-2024-5986cvecve-2024-5986cwe-73
Published: Mon Feb 02 2026 (02/02/2026, 10:36:24 UTC)
Source: CVE Database V5
Vendor/Project: h2oai
Product: h2oai/h2o-3

Description

CVE-2024-5986 is a critical vulnerability in h2oai/h2o-3 version 3. 46. 0. 1 that allows remote attackers to write arbitrary data to any file on the server without authentication or user interaction. Exploiting the /3/Parse endpoint, attackers can inject malicious data as the header of an empty file, which is then exported via the /3/Frames/framename/export endpoint. This flaw enables overwriting critical system files, including private SSH keys and scripts, potentially leading to remote code execution and full system compromise. The vulnerability has a CVSS score of 9. 1, indicating high severity with network attack vector and no privileges required. Although no known exploits are currently reported in the wild, the impact on confidentiality, integrity, and availability is severe. European organizations using h2o-3 for AI or data processing workloads are at risk, especially those in countries with high adoption of AI technologies and critical infrastructure reliance.

AI-Powered Analysis

AILast updated: 02/02/2026, 11:14:48 UTC

Technical Analysis

CVE-2024-5986 is a critical security vulnerability identified in the h2oai/h2o-3 software, specifically version 3.46.0.1. The vulnerability arises from improper external control of file names or paths (CWE-73), allowing remote attackers to write arbitrary data to any file on the server hosting the application. The attack vector involves two endpoints: first, the attacker sends malicious data to the /3/Parse endpoint, which injects attacker-controlled content as the header of an empty file. Then, the attacker triggers the /3/Frames/framename/export endpoint to export this file, effectively writing arbitrary data to a file path of their choosing. This can lead to overwriting critical files such as private SSH keys, system scripts, or configuration files, enabling remote code execution and full system compromise. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network, making it highly dangerous. The CVSS v3.0 score of 9.1 reflects the ease of exploitation and the critical impact on system integrity and availability. Although no public exploits have been reported yet, the vulnerability's nature makes it a prime target for attackers aiming to gain persistent access or disrupt services. The lack of available patches at the time of reporting increases the urgency for organizations to implement interim mitigations. This vulnerability affects any deployment of h2o-3 version 3.46.0.1 or potentially other unspecified versions, especially in environments where the application is exposed to untrusted networks or users.

Potential Impact

For European organizations, the impact of CVE-2024-5986 is significant. Organizations using h2o-3 for AI model training, data analytics, or machine learning workloads could face complete system compromise if exploited. Confidentiality is at risk as attackers can overwrite private keys and sensitive files, potentially leading to unauthorized data access or lateral movement within networks. Integrity is severely impacted because critical system and application files can be altered or replaced, undermining trust in the affected systems. Availability is also threatened since attackers could disrupt services by corrupting essential files or deploying malicious scripts. The risk is heightened for sectors with critical infrastructure dependencies, such as finance, healthcare, energy, and government, where AI tools like h2o-3 are increasingly integrated. The vulnerability's remote and unauthenticated nature means attackers can exploit it without prior access, increasing the attack surface. The absence of known exploits currently provides a narrow window for proactive defense, but the critical severity demands immediate attention to avoid potential widespread exploitation.

Mitigation Recommendations

Given the absence of an official patch at the time of reporting, European organizations should implement the following specific mitigations: 1) Restrict network access to the h2o-3 service endpoints, especially /3/Parse and /3/Frames/framename/export, using firewalls or network segmentation to limit exposure to trusted users only. 2) Employ strict input validation and sanitization at the application layer to detect and block malicious payloads attempting to manipulate file paths or inject arbitrary data. 3) Monitor logs and network traffic for unusual activity related to file exports or unexpected file modifications, enabling early detection of exploitation attempts. 4) Use application-layer proxies or web application firewalls (WAFs) configured with custom rules to block suspicious requests targeting vulnerable endpoints. 5) Isolate h2o-3 deployments in containerized or sandboxed environments to limit the blast radius in case of compromise. 6) Regularly back up critical configuration and key files, ensuring rapid recovery if files are overwritten. 7) Stay informed on vendor advisories and apply patches immediately once available. 8) Conduct penetration testing and vulnerability assessments focused on h2o-3 to identify exposure and verify mitigation effectiveness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2024-06-13T18:37:40.863Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 698083b8f9fa50a62f37058f

Added to database: 2/2/2026, 11:00:08 AM

Last enriched: 2/2/2026, 11:14:48 AM

Last updated: 2/2/2026, 12:05:24 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats