Skip to main content

CVE-2025-50466: n/a

High
VulnerabilityCVE-2025-50466cvecve-2025-50466
Published: Fri Aug 08 2025 (08/08/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

OpenMetadata <=1.4.4 is vulnerable to SQL Injection. An attacker can extract information from the database in function listCount in the TestDefinitionDAO interface. The entityType parameter can be used to build a SQL query.

AI-Powered Analysis

AILast updated: 08/08/2025, 17:17:49 UTC

Technical Analysis

CVE-2025-50466 is a high-severity SQL Injection vulnerability affecting OpenMetadata versions up to and including 1.4.4. The vulnerability resides in the listCount function within the TestDefinitionDAO interface, where the entityType parameter is improperly sanitized and directly used to construct SQL queries. This flaw allows an attacker with limited privileges (PR:L) and no user interaction (UI:N) to execute arbitrary SQL commands remotely (AV:N) over the network without authentication (AC:L). The attack can lead to unauthorized extraction of sensitive information from the underlying database, compromising confidentiality (C:H) and partially affecting integrity (I:L) by potentially manipulating query results or causing data inconsistencies. The vulnerability does not impact availability (A:N). The CVSS 3.1 base score is 7.1, reflecting a high risk due to ease of exploitation and significant confidentiality impact. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided yet. The vulnerability was reserved in June 2025 and published in August 2025, indicating recent discovery. OpenMetadata is an open-source metadata management platform used to catalog, manage, and govern data assets, often deployed in data-driven organizations to improve data observability and governance.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises relying on OpenMetadata for data governance and compliance with regulations such as GDPR. Exploitation could lead to unauthorized disclosure of personal data and sensitive business information stored in the metadata repository, potentially resulting in data breaches and regulatory penalties. The ability to extract database information without authentication increases the threat landscape, as attackers could leverage this flaw to gain insights into organizational data structures and potentially escalate attacks. The partial integrity impact could also undermine trust in data quality and governance processes. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and public administration, are particularly vulnerable. Additionally, the lack of user interaction requirement facilitates automated exploitation attempts, increasing the likelihood of attacks if the vulnerability remains unpatched.

Mitigation Recommendations

European organizations should immediately audit their OpenMetadata deployments to identify affected versions (<=1.4.4). Until an official patch is released, organizations should implement the following mitigations: 1) Restrict network access to the OpenMetadata service, limiting it to trusted internal networks and VPNs to reduce exposure to remote attackers. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting the entityType parameter. 3) Conduct thorough input validation and sanitization on all parameters, especially entityType, at the application or proxy level if possible. 4) Monitor database query logs and application logs for anomalous queries or repeated access attempts indicative of exploitation attempts. 5) Implement strict role-based access controls to minimize privileges of users interacting with the TestDefinitionDAO interface. 6) Prepare for rapid patch deployment once an official fix is available by establishing a vulnerability response plan. 7) Consider isolating the metadata database with additional security controls such as encryption at rest and network segmentation to limit data exposure in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68962db8ad5a09ad0005624a

Added to database: 8/8/2025, 5:02:48 PM

Last enriched: 8/8/2025, 5:17:49 PM

Last updated: 8/9/2025, 2:38:47 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats