Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10702: CWE-94 Improper Control of Generation of Code ('Code Injection') in Progress DataDirect Connect for JDBC for Amazon Redshift

0
High
VulnerabilityCVE-2025-10702cvecve-2025-10702cwe-94
Published: Wed Nov 19 2025 (11/19/2025, 15:46:26 UTC)
Source: CVE Database V5
Vendor/Project: Progress
Product: DataDirect Connect for JDBC for Amazon Redshift

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in Progress DataDirect Connect for JDBC drivers, Progress DataDirect Open Access JDBC driver and Hybrid Data Pipeline allows Remote Code Inclusion. The SpyAttribute connection option implemented by the DataDirect Connect for JDBC drivers, DataDirect Hybrid Data Pipeline JDBC driver and the DataDirect OpenAccess JDBC driver supports an undocumented syntax construct for the option value that if discovered can be used by an attacker. If an application allows an end user to specify a value for the SpyAttributes connection option then an attacker can use the undocumented syntax to cause the driver to load an arbitrary class on the class path and execute a constructor on that class.   This issue affects: DataDirect Connect for JDBC for Amazon Redshift: through 6.0.0.001392, fixed in 6.0.0.001541 DataDirect Connect for JDBC for Apache Cassandra: through 6.0.0.000805, fixed in 6.0.0.000833 DataDirect Connect for JDBC for Hive: through 6.0.1.001499, fixed in 6.0.1.001628 DataDirect Connect for JDBC for Apache Impala: through 6.0.0.001155, fixed in 6.0.0.001279 DataDirect Connect for JDBC for Apache SparkSQL: through 6.0.1.001222, fixed in 6.0.1.001344 DataDirect Connect for JDBC Autonomous REST Connector: through 6.0.1.006961, fixed in 6.0.1.007063 DataDirect Connect for JDBC for DB2: through 6.0.0.000717, fixed in 6.0.0.000964 DataDirect Connect for JDBC for Google Analytics 4: through 6.0.0.000454, fixed in 6.0.0.000525 DataDirect Connect for JDBC for Google BigQuery: through 6.0.0.002279, fixed in 6.0.0.002410 DataDirect Connect for JDBC for Greenplum: through 6.0.0.001712, fixed in 6.0.0.001727 DataDirect Connect for JDBC for Informix: through 6.0.0.000690, fixed in 6.0.0.0851 DataDirect Connect for JDBC for Microsoft Dynamics 365: through 6.0.0.003161, fixed in 6.0.0.3198 DataDirect Connect for JDBC for Microsoft SQLServer: through 6.0.0.001936, fixed in 6.0.0.001957 DataDirect Connect for JDBC for Microsoft Sharepoint: through 6.0.0.001559, fixed in 6.0.0.001587 DataDirect Connect for JDBC for MongoDB: through 6.1.0.001654, fixed in 6.1.0.001669 DataDirect Connect for JDBC for MySQL: through 5.1.4.000330, fixed in 5.1.4.000364 DataDirect Connect for JDBC for Oracle Database: through 6.0.0.001747, fixed in 6.0.0.001776 DataDirect Connect for JDBC for Oracle Eloqua: through 6.0.0.001438, fixed in 6.0.0.001458 DataDirect Connect for JDBC for Oracle Sales Cloud: through 6.0.0.001225, fixed in 6.0.0.001316 DataDirect Connect for JDBC for Oracle Service Cloud: through 5.1.4.000298, fixed in 5.1.4.000309 DataDirect Connect for JDBC for PostgreSQL: through 6.0.0.001843, fixed in 6.0.0.001856 DataDirect Connect for JDBC for Progress OpenEdge: through 5.1.4.000187, fixed in 5.1.4.000189 DataDirect Connect for JDBC for Salesforce: through 6.0.0.003020, fixed in 6.0.0.003125 DataDirect Connect for JDBC for SAP HANA: through 6.0.0.000879, product retired DataDirect Connect for JDBC for SAP S/4 HANA: through 6.0.1.001818, fixed in 6.0.1.001858 DataDirect Connect for JDBC for Sybase ASE: through 5.1.4.000161, fixed in 5.1.4.000162 DataDirect Connect for JDBC for Snowflake: through 6.0.1.001821, fixed in 6.0.1.001856 DataDirect Hybrid Data Pipeline Server: through 4.6.2.3309, fixed in 4.6.2.3430 DataDirect Hybrid Data Pipeline JDBC Driver: through 4.6.2.0607, fixed in 4.6.2.1023 DataDirect Hybrid Data Pipeline On Premises Connector: through 4.6.2.1223, fixed in 4.6.2.1339 DataDirect Hybrid Data Pipeline Docker: through 4.6.2.3316, fixed in 4.6.2.3430 DataDirect OpenAccess JDBC Driver: through 8.1.0.0177, fixed in 8.1.0.0183 DataDirect OpenAccess JDBC Driver: through 9.0.0.0019, fixed in 9.0.0.0022

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:25:58 UTC

Technical Analysis

CVE-2025-10702 is a critical code injection vulnerability classified under CWE-94, affecting Progress DataDirect Connect for JDBC drivers, including those for Amazon Redshift, Apache Cassandra, Hive, Impala, SparkSQL, and many others. The root cause lies in the SpyAttribute connection option, which supports an undocumented syntax construct. If an application allows an end user to specify the SpyAttributes option, an attacker can exploit this to cause the JDBC driver to load an arbitrary class from the class path and execute its constructor, effectively enabling remote code execution. This vulnerability does not require user interaction or authentication, making it highly exploitable in environments where end users can influence connection parameters. The issue affects a broad range of DataDirect JDBC drivers and related products, with fixed versions released across all affected drivers. The CVSS 4.0 base score is 8.6 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. The vulnerability can lead to full system compromise, data theft, or disruption of services. No known exploits in the wild have been reported yet, but the wide usage of these drivers in enterprise environments increases the risk of targeted attacks. The vulnerability is particularly dangerous because it leverages an undocumented feature, which may not be well understood or monitored by administrators.

Potential Impact

The impact of CVE-2025-10702 is significant for organizations using affected Progress DataDirect Connect for JDBC drivers. Successful exploitation allows remote attackers to execute arbitrary code within the context of the application using the JDBC driver, potentially leading to full system compromise. This can result in unauthorized data access, data manipulation, disruption of database services, and lateral movement within corporate networks. Given the wide range of affected drivers supporting major databases and cloud services (e.g., Amazon Redshift, Microsoft SQL Server, Oracle, PostgreSQL, MongoDB, Google BigQuery), the vulnerability threatens critical data infrastructure globally. Enterprises relying on these drivers for data analytics, business intelligence, and operational databases face risks to confidentiality, integrity, and availability of their data assets. The lack of required authentication and user interaction lowers the barrier for exploitation, increasing the likelihood of attacks. Additionally, the vulnerability could be leveraged in supply chain attacks or to bypass existing security controls by injecting malicious code at the driver level.

Mitigation Recommendations

Organizations should immediately identify all deployments of Progress DataDirect Connect for JDBC drivers and related products in their environments. The primary mitigation is to apply the vendor-provided patches or upgrade to fixed versions as listed in the advisory. Where patching is not immediately feasible, restrict or disable the use of the SpyAttribute connection option, especially preventing end users from specifying or modifying this parameter. Implement strict input validation and sanitization on any user-supplied connection parameters to block attempts to inject malicious syntax. Employ runtime application self-protection (RASP) or behavior monitoring to detect anomalous class loading or constructor execution patterns. Network segmentation and least privilege principles should be enforced to limit the impact of a potential compromise. Regularly audit and monitor logs for unusual JDBC driver activity. Finally, educate developers and administrators about the risks of undocumented features and ensure secure coding practices when handling connection options.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
ProgressSoftware
Date Reserved
2025-09-18T19:40:24.114Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691de8ff964c14ffeea9961d

Added to database: 11/19/2025, 3:57:51 PM

Last enriched: 2/27/2026, 6:25:58 AM

Last updated: 3/24/2026, 9:52:14 PM

Views: 158

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses