CVE-2025-10702: CWE-94 Improper Control of Generation of Code ('Code Injection') in Progress DataDirect Connect for JDBC for Amazon Redshift
Improper Control of Generation of Code ('Code Injection') vulnerability in Progress DataDirect Connect for JDBC drivers, Progress DataDirect Open Access JDBC driver and Hybrid Data Pipeline allows Remote Code Inclusion. The SpyAttribute connection option implemented by the DataDirect Connect for JDBC drivers, DataDirect Hybrid Data Pipeline JDBC driver and the DataDirect OpenAccess JDBC driver supports an undocumented syntax construct for the option value that if discovered can be used by an attacker. If an application allows an end user to specify a value for the SpyAttributes connection option then an attacker can use the undocumented syntax to cause the driver to load an arbitrary class on the class path and execute a constructor on that class. This issue affects: DataDirect Connect for JDBC for Amazon Redshift: through 6.0.0.001392, fixed in 6.0.0.001541 DataDirect Connect for JDBC for Apache Cassandra: through 6.0.0.000805, fixed in 6.0.0.000833 DataDirect Connect for JDBC for Hive: through 6.0.1.001499, fixed in 6.0.1.001628 DataDirect Connect for JDBC for Apache Impala: through 6.0.0.001155, fixed in 6.0.0.001279 DataDirect Connect for JDBC for Apache SparkSQL: through 6.0.1.001222, fixed in 6.0.1.001344 DataDirect Connect for JDBC Autonomous REST Connector: through 6.0.1.006961, fixed in 6.0.1.007063 DataDirect Connect for JDBC for DB2: through 6.0.0.000717, fixed in 6.0.0.000964 DataDirect Connect for JDBC for Google Analytics 4: through 6.0.0.000454, fixed in 6.0.0.000525 DataDirect Connect for JDBC for Google BigQuery: through 6.0.0.002279, fixed in 6.0.0.002410 DataDirect Connect for JDBC for Greenplum: through 6.0.0.001712, fixed in 6.0.0.001727 DataDirect Connect for JDBC for Informix: through 6.0.0.000690, fixed in 6.0.0.0851 DataDirect Connect for JDBC for Microsoft Dynamics 365: through 6.0.0.003161, fixed in 6.0.0.3198 DataDirect Connect for JDBC for Microsoft SQLServer: through 6.0.0.001936, fixed in 6.0.0.001957 DataDirect Connect for JDBC for Microsoft Sharepoint: through 6.0.0.001559, fixed in 6.0.0.001587 DataDirect Connect for JDBC for MongoDB: through 6.1.0.001654, fixed in 6.1.0.001669 DataDirect Connect for JDBC for MySQL: through 5.1.4.000330, fixed in 5.1.4.000364 DataDirect Connect for JDBC for Oracle Database: through 6.0.0.001747, fixed in 6.0.0.001776 DataDirect Connect for JDBC for Oracle Eloqua: through 6.0.0.001438, fixed in 6.0.0.001458 DataDirect Connect for JDBC for Oracle Sales Cloud: through 6.0.0.001225, fixed in 6.0.0.001316 DataDirect Connect for JDBC for Oracle Service Cloud: through 5.1.4.000298, fixed in 5.1.4.000309 DataDirect Connect for JDBC for PostgreSQL: through 6.0.0.001843, fixed in 6.0.0.001856 DataDirect Connect for JDBC for Progress OpenEdge: through 5.1.4.000187, fixed in 5.1.4.000189 DataDirect Connect for JDBC for Salesforce: through 6.0.0.003020, fixed in 6.0.0.003125 DataDirect Connect for JDBC for SAP HANA: through 6.0.0.000879, product retired DataDirect Connect for JDBC for SAP S/4 HANA: through 6.0.1.001818, fixed in 6.0.1.001858 DataDirect Connect for JDBC for Sybase ASE: through 5.1.4.000161, fixed in 5.1.4.000162 DataDirect Connect for JDBC for Snowflake: through 6.0.1.001821, fixed in 6.0.1.001856 DataDirect Hybrid Data Pipeline Server: through 4.6.2.3309, fixed in 4.6.2.3430 DataDirect Hybrid Data Pipeline JDBC Driver: through 4.6.2.0607, fixed in 4.6.2.1023 DataDirect Hybrid Data Pipeline On Premises Connector: through 4.6.2.1223, fixed in 4.6.2.1339 DataDirect Hybrid Data Pipeline Docker: through 4.6.2.3316, fixed in 4.6.2.3430 DataDirect OpenAccess JDBC Driver: through 8.1.0.0177, fixed in 8.1.0.0183 DataDirect OpenAccess JDBC Driver: through 9.0.0.0019, fixed in 9.0.0.0022
AI Analysis
Technical Summary
CVE-2025-10702 is a critical code injection vulnerability classified under CWE-94, found in Progress DataDirect Connect for JDBC drivers, including the Amazon Redshift variant and many others. The vulnerability stems from the SpyAttribute connection option, which supports an undocumented syntax construct. If an attacker can control the SpyAttributes option value in an application's connection string, they can exploit this syntax to force the JDBC driver to load an arbitrary Java class from the classpath and execute its constructor. This results in remote code execution (RCE) capabilities without requiring user interaction or prior authentication, making the attack vector network-based and highly accessible. The flaw affects a broad range of DataDirect Connect for JDBC drivers across multiple database platforms such as Amazon Redshift, Apache Cassandra, Hive, Microsoft SQL Server, Oracle, PostgreSQL, and others. The vulnerability impacts versions up to specific fixed releases, with patches available from Progress Software. The CVSS 4.0 score of 8.6 reflects the high severity due to the ease of exploitation, lack of required authentication, and the potential for full system compromise. No known exploits are currently reported in the wild, but the risk remains significant given the nature of the vulnerability and the widespread use of these drivers in enterprise environments. The vulnerability could allow attackers to execute arbitrary code on systems running vulnerable drivers, potentially leading to data breaches, system manipulation, or disruption of services.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to data confidentiality, integrity, and system availability. Many enterprises and public sector entities in Europe rely on JDBC drivers from Progress DataDirect to connect to critical databases such as Amazon Redshift, Oracle, Microsoft SQL Server, and PostgreSQL. Successful exploitation could lead to unauthorized remote code execution, enabling attackers to deploy malware, exfiltrate sensitive data, disrupt business operations, or pivot within networks. The impact is especially severe for organizations handling sensitive personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. Additionally, sectors such as finance, healthcare, telecommunications, and government services that depend heavily on these database technologies are at heightened risk. The broad range of affected drivers increases the attack surface, making supply chain and third-party risk management more complex. Given the network-based attack vector and no need for user interaction, the vulnerability could be exploited remotely, increasing the likelihood of targeted attacks against European infrastructure.
Mitigation Recommendations
1. Immediately apply the patches released by Progress Software for all affected DataDirect Connect for JDBC drivers and Hybrid Data Pipeline components, ensuring all versions are updated to the fixed releases listed in the advisory. 2. Restrict and validate all inputs that can influence connection string parameters, particularly the SpyAttributes option, to prevent untrusted user control. 3. Implement strict network segmentation and access controls to limit exposure of database connection endpoints to trusted hosts only. 4. Monitor application and driver logs for unusual class loading activities or unexpected connection option values that could indicate exploitation attempts. 5. Employ runtime application self-protection (RASP) or Java security managers to restrict the execution of arbitrary classes and constructors at runtime. 6. Conduct thorough code reviews and security testing of applications that allow dynamic configuration of JDBC connection parameters. 7. Educate developers and administrators about the risks of undocumented driver features and enforce secure coding practices around database connectivity. 8. Maintain an inventory of all JDBC drivers in use across the organization to ensure timely patch management and vulnerability tracking. 9. Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) tuned to detect exploitation patterns related to this vulnerability. 10. Coordinate with vendors and security teams to stay informed about any emerging exploits or additional mitigations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-10702: CWE-94 Improper Control of Generation of Code ('Code Injection') in Progress DataDirect Connect for JDBC for Amazon Redshift
Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Progress DataDirect Connect for JDBC drivers, Progress DataDirect Open Access JDBC driver and Hybrid Data Pipeline allows Remote Code Inclusion. The SpyAttribute connection option implemented by the DataDirect Connect for JDBC drivers, DataDirect Hybrid Data Pipeline JDBC driver and the DataDirect OpenAccess JDBC driver supports an undocumented syntax construct for the option value that if discovered can be used by an attacker. If an application allows an end user to specify a value for the SpyAttributes connection option then an attacker can use the undocumented syntax to cause the driver to load an arbitrary class on the class path and execute a constructor on that class. This issue affects: DataDirect Connect for JDBC for Amazon Redshift: through 6.0.0.001392, fixed in 6.0.0.001541 DataDirect Connect for JDBC for Apache Cassandra: through 6.0.0.000805, fixed in 6.0.0.000833 DataDirect Connect for JDBC for Hive: through 6.0.1.001499, fixed in 6.0.1.001628 DataDirect Connect for JDBC for Apache Impala: through 6.0.0.001155, fixed in 6.0.0.001279 DataDirect Connect for JDBC for Apache SparkSQL: through 6.0.1.001222, fixed in 6.0.1.001344 DataDirect Connect for JDBC Autonomous REST Connector: through 6.0.1.006961, fixed in 6.0.1.007063 DataDirect Connect for JDBC for DB2: through 6.0.0.000717, fixed in 6.0.0.000964 DataDirect Connect for JDBC for Google Analytics 4: through 6.0.0.000454, fixed in 6.0.0.000525 DataDirect Connect for JDBC for Google BigQuery: through 6.0.0.002279, fixed in 6.0.0.002410 DataDirect Connect for JDBC for Greenplum: through 6.0.0.001712, fixed in 6.0.0.001727 DataDirect Connect for JDBC for Informix: through 6.0.0.000690, fixed in 6.0.0.0851 DataDirect Connect for JDBC for Microsoft Dynamics 365: through 6.0.0.003161, fixed in 6.0.0.3198 DataDirect Connect for JDBC for Microsoft SQLServer: through 6.0.0.001936, fixed in 6.0.0.001957 DataDirect Connect for JDBC for Microsoft Sharepoint: through 6.0.0.001559, fixed in 6.0.0.001587 DataDirect Connect for JDBC for MongoDB: through 6.1.0.001654, fixed in 6.1.0.001669 DataDirect Connect for JDBC for MySQL: through 5.1.4.000330, fixed in 5.1.4.000364 DataDirect Connect for JDBC for Oracle Database: through 6.0.0.001747, fixed in 6.0.0.001776 DataDirect Connect for JDBC for Oracle Eloqua: through 6.0.0.001438, fixed in 6.0.0.001458 DataDirect Connect for JDBC for Oracle Sales Cloud: through 6.0.0.001225, fixed in 6.0.0.001316 DataDirect Connect for JDBC for Oracle Service Cloud: through 5.1.4.000298, fixed in 5.1.4.000309 DataDirect Connect for JDBC for PostgreSQL: through 6.0.0.001843, fixed in 6.0.0.001856 DataDirect Connect for JDBC for Progress OpenEdge: through 5.1.4.000187, fixed in 5.1.4.000189 DataDirect Connect for JDBC for Salesforce: through 6.0.0.003020, fixed in 6.0.0.003125 DataDirect Connect for JDBC for SAP HANA: through 6.0.0.000879, product retired DataDirect Connect for JDBC for SAP S/4 HANA: through 6.0.1.001818, fixed in 6.0.1.001858 DataDirect Connect for JDBC for Sybase ASE: through 5.1.4.000161, fixed in 5.1.4.000162 DataDirect Connect for JDBC for Snowflake: through 6.0.1.001821, fixed in 6.0.1.001856 DataDirect Hybrid Data Pipeline Server: through 4.6.2.3309, fixed in 4.6.2.3430 DataDirect Hybrid Data Pipeline JDBC Driver: through 4.6.2.0607, fixed in 4.6.2.1023 DataDirect Hybrid Data Pipeline On Premises Connector: through 4.6.2.1223, fixed in 4.6.2.1339 DataDirect Hybrid Data Pipeline Docker: through 4.6.2.3316, fixed in 4.6.2.3430 DataDirect OpenAccess JDBC Driver: through 8.1.0.0177, fixed in 8.1.0.0183 DataDirect OpenAccess JDBC Driver: through 9.0.0.0019, fixed in 9.0.0.0022
AI-Powered Analysis
Technical Analysis
CVE-2025-10702 is a critical code injection vulnerability classified under CWE-94, found in Progress DataDirect Connect for JDBC drivers, including the Amazon Redshift variant and many others. The vulnerability stems from the SpyAttribute connection option, which supports an undocumented syntax construct. If an attacker can control the SpyAttributes option value in an application's connection string, they can exploit this syntax to force the JDBC driver to load an arbitrary Java class from the classpath and execute its constructor. This results in remote code execution (RCE) capabilities without requiring user interaction or prior authentication, making the attack vector network-based and highly accessible. The flaw affects a broad range of DataDirect Connect for JDBC drivers across multiple database platforms such as Amazon Redshift, Apache Cassandra, Hive, Microsoft SQL Server, Oracle, PostgreSQL, and others. The vulnerability impacts versions up to specific fixed releases, with patches available from Progress Software. The CVSS 4.0 score of 8.6 reflects the high severity due to the ease of exploitation, lack of required authentication, and the potential for full system compromise. No known exploits are currently reported in the wild, but the risk remains significant given the nature of the vulnerability and the widespread use of these drivers in enterprise environments. The vulnerability could allow attackers to execute arbitrary code on systems running vulnerable drivers, potentially leading to data breaches, system manipulation, or disruption of services.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to data confidentiality, integrity, and system availability. Many enterprises and public sector entities in Europe rely on JDBC drivers from Progress DataDirect to connect to critical databases such as Amazon Redshift, Oracle, Microsoft SQL Server, and PostgreSQL. Successful exploitation could lead to unauthorized remote code execution, enabling attackers to deploy malware, exfiltrate sensitive data, disrupt business operations, or pivot within networks. The impact is especially severe for organizations handling sensitive personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. Additionally, sectors such as finance, healthcare, telecommunications, and government services that depend heavily on these database technologies are at heightened risk. The broad range of affected drivers increases the attack surface, making supply chain and third-party risk management more complex. Given the network-based attack vector and no need for user interaction, the vulnerability could be exploited remotely, increasing the likelihood of targeted attacks against European infrastructure.
Mitigation Recommendations
1. Immediately apply the patches released by Progress Software for all affected DataDirect Connect for JDBC drivers and Hybrid Data Pipeline components, ensuring all versions are updated to the fixed releases listed in the advisory. 2. Restrict and validate all inputs that can influence connection string parameters, particularly the SpyAttributes option, to prevent untrusted user control. 3. Implement strict network segmentation and access controls to limit exposure of database connection endpoints to trusted hosts only. 4. Monitor application and driver logs for unusual class loading activities or unexpected connection option values that could indicate exploitation attempts. 5. Employ runtime application self-protection (RASP) or Java security managers to restrict the execution of arbitrary classes and constructors at runtime. 6. Conduct thorough code reviews and security testing of applications that allow dynamic configuration of JDBC connection parameters. 7. Educate developers and administrators about the risks of undocumented driver features and enforce secure coding practices around database connectivity. 8. Maintain an inventory of all JDBC drivers in use across the organization to ensure timely patch management and vulnerability tracking. 9. Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) tuned to detect exploitation patterns related to this vulnerability. 10. Coordinate with vendors and security teams to stay informed about any emerging exploits or additional mitigations.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ProgressSoftware
- Date Reserved
- 2025-09-18T19:40:24.114Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691de8ff964c14ffeea9961d
Added to database: 11/19/2025, 3:57:51 PM
Last enriched: 11/26/2025, 5:09:30 PM
Last updated: 1/7/2026, 8:50:22 AM
Views: 67
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.