CVE-2025-10702: CWE-94 Improper Control of Generation of Code ('Code Injection') in Progress DataDirect Connect for JDBC for Amazon Redshift
Improper Control of Generation of Code ('Code Injection') vulnerability in Progress DataDirect Connect for JDBC drivers, Progress DataDirect Open Access JDBC driver and Hybrid Data Pipeline allows Remote Code Inclusion. The SpyAttribute connection option implemented by the DataDirect Connect for JDBC drivers, DataDirect Hybrid Data Pipeline JDBC driver and the DataDirect OpenAccess JDBC driver supports an undocumented syntax construct for the option value that if discovered can be used by an attacker. If an application allows an end user to specify a value for the SpyAttributes connection option then an attacker can use the undocumented syntax to cause the driver to load an arbitrary class on the class path and execute a constructor on that class. This issue affects: DataDirect Connect for JDBC for Amazon Redshift: through 6.0.0.001392, fixed in 6.0.0.001541 DataDirect Connect for JDBC for Apache Cassandra: through 6.0.0.000805, fixed in 6.0.0.000833 DataDirect Connect for JDBC for Hive: through 6.0.1.001499, fixed in 6.0.1.001628 DataDirect Connect for JDBC for Apache Impala: through 6.0.0.001155, fixed in 6.0.0.001279 DataDirect Connect for JDBC for Apache SparkSQL: through 6.0.1.001222, fixed in 6.0.1.001344 DataDirect Connect for JDBC Autonomous REST Connector: through 6.0.1.006961, fixed in 6.0.1.007063 DataDirect Connect for JDBC for DB2: through 6.0.0.000717, fixed in 6.0.0.000964 DataDirect Connect for JDBC for Google Analytics 4: through 6.0.0.000454, fixed in 6.0.0.000525 DataDirect Connect for JDBC for Google BigQuery: through 6.0.0.002279, fixed in 6.0.0.002410 DataDirect Connect for JDBC for Greenplum: through 6.0.0.001712, fixed in 6.0.0.001727 DataDirect Connect for JDBC for Informix: through 6.0.0.000690, fixed in 6.0.0.0851 DataDirect Connect for JDBC for Microsoft Dynamics 365: through 6.0.0.003161, fixed in 6.0.0.3198 DataDirect Connect for JDBC for Microsoft SQLServer: through 6.0.0.001936, fixed in 6.0.0.001957 DataDirect Connect for JDBC for Microsoft Sharepoint: through 6.0.0.001559, fixed in 6.0.0.001587 DataDirect Connect for JDBC for MongoDB: through 6.1.0.001654, fixed in 6.1.0.001669 DataDirect Connect for JDBC for MySQL: through 5.1.4.000330, fixed in 5.1.4.000364 DataDirect Connect for JDBC for Oracle Database: through 6.0.0.001747, fixed in 6.0.0.001776 DataDirect Connect for JDBC for Oracle Eloqua: through 6.0.0.001438, fixed in 6.0.0.001458 DataDirect Connect for JDBC for Oracle Sales Cloud: through 6.0.0.001225, fixed in 6.0.0.001316 DataDirect Connect for JDBC for Oracle Service Cloud: through 5.1.4.000298, fixed in 5.1.4.000309 DataDirect Connect for JDBC for PostgreSQL: through 6.0.0.001843, fixed in 6.0.0.001856 DataDirect Connect for JDBC for Progress OpenEdge: through 5.1.4.000187, fixed in 5.1.4.000189 DataDirect Connect for JDBC for Salesforce: through 6.0.0.003020, fixed in 6.0.0.003125 DataDirect Connect for JDBC for SAP HANA: through 6.0.0.000879, product retired DataDirect Connect for JDBC for SAP S/4 HANA: through 6.0.1.001818, fixed in 6.0.1.001858 DataDirect Connect for JDBC for Sybase ASE: through 5.1.4.000161, fixed in 5.1.4.000162 DataDirect Connect for JDBC for Snowflake: through 6.0.1.001821, fixed in 6.0.1.001856 DataDirect Hybrid Data Pipeline Server: through 4.6.2.3309, fixed in 4.6.2.3430 DataDirect Hybrid Data Pipeline JDBC Driver: through 4.6.2.0607, fixed in 4.6.2.1023 DataDirect Hybrid Data Pipeline On Premises Connector: through 4.6.2.1223, fixed in 4.6.2.1339 DataDirect Hybrid Data Pipeline Docker: through 4.6.2.3316, fixed in 4.6.2.3430 DataDirect OpenAccess JDBC Driver: through 8.1.0.0177, fixed in 8.1.0.0183 DataDirect OpenAccess JDBC Driver: through 9.0.0.0019, fixed in 9.0.0.0022
AI Analysis
Technical Summary
CVE-2025-10702 is a critical code injection vulnerability classified under CWE-94, affecting Progress DataDirect Connect for JDBC drivers, including the Amazon Redshift driver and many others such as those for Apache Cassandra, Hive, Microsoft SQL Server, Oracle, PostgreSQL, and more. The root cause lies in the SpyAttribute connection option, which supports an undocumented syntax that attackers can exploit to load arbitrary Java classes from the classpath and execute their constructors. This capability effectively allows remote code execution (RCE) if an attacker can supply or manipulate the SpyAttributes option value in the JDBC connection string. The vulnerability does not require user interaction or authentication, making it highly exploitable in environments where user input is passed unchecked to connection options. The affected products span a wide range of database connectors and hybrid data pipeline components, with versions prior to specific fixed releases vulnerable. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:H/SI:H/SA:H) indicates network attack vector, low complexity, no user interaction, and high impact on confidentiality, integrity, and availability, with partial privileges required. Although no known exploits are reported in the wild yet, the nature of the vulnerability and the broad product impact make it a significant threat. Attackers exploiting this flaw could execute arbitrary code on systems running vulnerable JDBC drivers, potentially compromising backend databases, exfiltrating sensitive data, or pivoting within enterprise networks.
Potential Impact
For European organizations, the impact of CVE-2025-10702 is substantial due to the widespread use of Progress DataDirect JDBC drivers in enterprise data environments, including cloud and hybrid infrastructures. Successful exploitation could lead to remote code execution on critical data access layers, enabling attackers to compromise database confidentiality, integrity, and availability. This could result in unauthorized data access, data manipulation, disruption of business operations, and potential regulatory non-compliance under GDPR due to data breaches. Organizations relying on Amazon Redshift, Oracle, Microsoft SQL Server, PostgreSQL, and other affected databases via these JDBC drivers are particularly at risk. The vulnerability's ease of exploitation without user interaction or authentication increases the likelihood of targeted attacks or automated exploitation attempts. Additionally, attackers could leverage this vulnerability to establish persistent footholds or move laterally within networks, amplifying the overall damage. The impact is heightened in sectors with critical data assets such as finance, healthcare, telecommunications, and government services prevalent in Europe.
Mitigation Recommendations
To mitigate CVE-2025-10702 effectively, European organizations should: 1) Immediately identify all instances of Progress DataDirect Connect for JDBC drivers and related DataDirect Hybrid Data Pipeline components in their environments. 2) Upgrade all affected drivers to the fixed versions listed by Progress Software, ensuring no vulnerable versions remain in production or development. 3) Audit and restrict the use of the SpyAttributes connection option, especially preventing end-user or untrusted input from influencing its value. 4) Implement strict input validation and sanitization on any application components that construct JDBC connection strings dynamically. 5) Employ runtime application self-protection (RASP) or Java security manager policies to limit class loading and execution privileges where feasible. 6) Monitor network traffic and logs for anomalous JDBC connection strings or attempts to exploit the undocumented syntax. 7) Conduct penetration testing and code reviews focusing on JDBC connection handling to detect similar injection vectors. 8) Coordinate with database and application teams to ensure secure configuration and patch management practices are in place. 9) Consider network segmentation and least privilege principles to contain potential breaches. 10) Stay informed on vendor advisories and threat intelligence for any emerging exploit activity related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Switzerland, Poland
CVE-2025-10702: CWE-94 Improper Control of Generation of Code ('Code Injection') in Progress DataDirect Connect for JDBC for Amazon Redshift
Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Progress DataDirect Connect for JDBC drivers, Progress DataDirect Open Access JDBC driver and Hybrid Data Pipeline allows Remote Code Inclusion. The SpyAttribute connection option implemented by the DataDirect Connect for JDBC drivers, DataDirect Hybrid Data Pipeline JDBC driver and the DataDirect OpenAccess JDBC driver supports an undocumented syntax construct for the option value that if discovered can be used by an attacker. If an application allows an end user to specify a value for the SpyAttributes connection option then an attacker can use the undocumented syntax to cause the driver to load an arbitrary class on the class path and execute a constructor on that class. This issue affects: DataDirect Connect for JDBC for Amazon Redshift: through 6.0.0.001392, fixed in 6.0.0.001541 DataDirect Connect for JDBC for Apache Cassandra: through 6.0.0.000805, fixed in 6.0.0.000833 DataDirect Connect for JDBC for Hive: through 6.0.1.001499, fixed in 6.0.1.001628 DataDirect Connect for JDBC for Apache Impala: through 6.0.0.001155, fixed in 6.0.0.001279 DataDirect Connect for JDBC for Apache SparkSQL: through 6.0.1.001222, fixed in 6.0.1.001344 DataDirect Connect for JDBC Autonomous REST Connector: through 6.0.1.006961, fixed in 6.0.1.007063 DataDirect Connect for JDBC for DB2: through 6.0.0.000717, fixed in 6.0.0.000964 DataDirect Connect for JDBC for Google Analytics 4: through 6.0.0.000454, fixed in 6.0.0.000525 DataDirect Connect for JDBC for Google BigQuery: through 6.0.0.002279, fixed in 6.0.0.002410 DataDirect Connect for JDBC for Greenplum: through 6.0.0.001712, fixed in 6.0.0.001727 DataDirect Connect for JDBC for Informix: through 6.0.0.000690, fixed in 6.0.0.0851 DataDirect Connect for JDBC for Microsoft Dynamics 365: through 6.0.0.003161, fixed in 6.0.0.3198 DataDirect Connect for JDBC for Microsoft SQLServer: through 6.0.0.001936, fixed in 6.0.0.001957 DataDirect Connect for JDBC for Microsoft Sharepoint: through 6.0.0.001559, fixed in 6.0.0.001587 DataDirect Connect for JDBC for MongoDB: through 6.1.0.001654, fixed in 6.1.0.001669 DataDirect Connect for JDBC for MySQL: through 5.1.4.000330, fixed in 5.1.4.000364 DataDirect Connect for JDBC for Oracle Database: through 6.0.0.001747, fixed in 6.0.0.001776 DataDirect Connect for JDBC for Oracle Eloqua: through 6.0.0.001438, fixed in 6.0.0.001458 DataDirect Connect for JDBC for Oracle Sales Cloud: through 6.0.0.001225, fixed in 6.0.0.001316 DataDirect Connect for JDBC for Oracle Service Cloud: through 5.1.4.000298, fixed in 5.1.4.000309 DataDirect Connect for JDBC for PostgreSQL: through 6.0.0.001843, fixed in 6.0.0.001856 DataDirect Connect for JDBC for Progress OpenEdge: through 5.1.4.000187, fixed in 5.1.4.000189 DataDirect Connect for JDBC for Salesforce: through 6.0.0.003020, fixed in 6.0.0.003125 DataDirect Connect for JDBC for SAP HANA: through 6.0.0.000879, product retired DataDirect Connect for JDBC for SAP S/4 HANA: through 6.0.1.001818, fixed in 6.0.1.001858 DataDirect Connect for JDBC for Sybase ASE: through 5.1.4.000161, fixed in 5.1.4.000162 DataDirect Connect for JDBC for Snowflake: through 6.0.1.001821, fixed in 6.0.1.001856 DataDirect Hybrid Data Pipeline Server: through 4.6.2.3309, fixed in 4.6.2.3430 DataDirect Hybrid Data Pipeline JDBC Driver: through 4.6.2.0607, fixed in 4.6.2.1023 DataDirect Hybrid Data Pipeline On Premises Connector: through 4.6.2.1223, fixed in 4.6.2.1339 DataDirect Hybrid Data Pipeline Docker: through 4.6.2.3316, fixed in 4.6.2.3430 DataDirect OpenAccess JDBC Driver: through 8.1.0.0177, fixed in 8.1.0.0183 DataDirect OpenAccess JDBC Driver: through 9.0.0.0019, fixed in 9.0.0.0022
AI-Powered Analysis
Technical Analysis
CVE-2025-10702 is a critical code injection vulnerability classified under CWE-94, affecting Progress DataDirect Connect for JDBC drivers, including the Amazon Redshift driver and many others such as those for Apache Cassandra, Hive, Microsoft SQL Server, Oracle, PostgreSQL, and more. The root cause lies in the SpyAttribute connection option, which supports an undocumented syntax that attackers can exploit to load arbitrary Java classes from the classpath and execute their constructors. This capability effectively allows remote code execution (RCE) if an attacker can supply or manipulate the SpyAttributes option value in the JDBC connection string. The vulnerability does not require user interaction or authentication, making it highly exploitable in environments where user input is passed unchecked to connection options. The affected products span a wide range of database connectors and hybrid data pipeline components, with versions prior to specific fixed releases vulnerable. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:H/SI:H/SA:H) indicates network attack vector, low complexity, no user interaction, and high impact on confidentiality, integrity, and availability, with partial privileges required. Although no known exploits are reported in the wild yet, the nature of the vulnerability and the broad product impact make it a significant threat. Attackers exploiting this flaw could execute arbitrary code on systems running vulnerable JDBC drivers, potentially compromising backend databases, exfiltrating sensitive data, or pivoting within enterprise networks.
Potential Impact
For European organizations, the impact of CVE-2025-10702 is substantial due to the widespread use of Progress DataDirect JDBC drivers in enterprise data environments, including cloud and hybrid infrastructures. Successful exploitation could lead to remote code execution on critical data access layers, enabling attackers to compromise database confidentiality, integrity, and availability. This could result in unauthorized data access, data manipulation, disruption of business operations, and potential regulatory non-compliance under GDPR due to data breaches. Organizations relying on Amazon Redshift, Oracle, Microsoft SQL Server, PostgreSQL, and other affected databases via these JDBC drivers are particularly at risk. The vulnerability's ease of exploitation without user interaction or authentication increases the likelihood of targeted attacks or automated exploitation attempts. Additionally, attackers could leverage this vulnerability to establish persistent footholds or move laterally within networks, amplifying the overall damage. The impact is heightened in sectors with critical data assets such as finance, healthcare, telecommunications, and government services prevalent in Europe.
Mitigation Recommendations
To mitigate CVE-2025-10702 effectively, European organizations should: 1) Immediately identify all instances of Progress DataDirect Connect for JDBC drivers and related DataDirect Hybrid Data Pipeline components in their environments. 2) Upgrade all affected drivers to the fixed versions listed by Progress Software, ensuring no vulnerable versions remain in production or development. 3) Audit and restrict the use of the SpyAttributes connection option, especially preventing end-user or untrusted input from influencing its value. 4) Implement strict input validation and sanitization on any application components that construct JDBC connection strings dynamically. 5) Employ runtime application self-protection (RASP) or Java security manager policies to limit class loading and execution privileges where feasible. 6) Monitor network traffic and logs for anomalous JDBC connection strings or attempts to exploit the undocumented syntax. 7) Conduct penetration testing and code reviews focusing on JDBC connection handling to detect similar injection vectors. 8) Coordinate with database and application teams to ensure secure configuration and patch management practices are in place. 9) Consider network segmentation and least privilege principles to contain potential breaches. 10) Stay informed on vendor advisories and threat intelligence for any emerging exploit activity related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ProgressSoftware
- Date Reserved
- 2025-09-18T19:40:24.114Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691de8ff964c14ffeea9961d
Added to database: 11/19/2025, 3:57:51 PM
Last enriched: 11/19/2025, 4:12:43 PM
Last updated: 11/22/2025, 12:21:31 PM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13526: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in walterpinem OneClick Chat to Order
HighCVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
MediumCVE-2025-13136: CWE-862 Missing Authorization in westerndeal GSheetConnector For Ninja Forms
MediumCVE-2025-13384: CWE-862 Missing Authorization in codepeople CP Contact Form with PayPal
HighCVE-2025-13317: CWE-862 Missing Authorization in codepeople Appointment Booking Calendar
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.