CVE-2025-5662: CWE-502 Deserialization of Untrusted Data in h2oai h2oai/h2o-3
A deserialization vulnerability exists in the H2O-3 REST API (POST /99/ImportSQLTable) that affects all versions up to 3.46.0.7. This vulnerability allows remote code execution (RCE) due to improper validation of JDBC connection parameters when using a Key-Value format. The vulnerability is present in the MySQL JDBC Driver version 8.0.19 and JDK version 8u112. The issue is resolved in version 3.46.0.8.
AI Analysis
Technical Summary
CVE-2025-5662 is a critical deserialization vulnerability (CWE-502) affecting the H2O-3 machine learning platform's REST API, specifically the POST /99/ImportSQLTable endpoint. This vulnerability exists in all versions of h2oai/h2o-3 up to 3.46.0.7. The root cause is improper validation of JDBC connection parameters when provided in a Key-Value format, which allows an attacker to craft malicious serialized data that the system deserializes without adequate checks. The vulnerability leverages the MySQL JDBC Driver version 8.0.19 and JDK version 8u112, both of which are components involved in processing the JDBC connection parameters. Successful exploitation leads to remote code execution (RCE) without requiring authentication or user interaction, making it highly dangerous. The vulnerability has a CVSS v3.0 score of 9.8, indicating critical severity with network attack vector, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. The issue was resolved in h2o-3 version 3.46.0.8. No known exploits are currently reported in the wild, but the ease of exploitation and severity suggest that attackers may develop exploits rapidly. The vulnerability affects systems running the vulnerable versions of H2O-3 that integrate with MySQL databases using the specified JDBC driver and JDK versions. Given the nature of H2O-3 as a widely used open-source machine learning platform, this vulnerability poses a significant risk to data science and analytics environments that rely on it for data import and processing.
Potential Impact
For European organizations, the impact of CVE-2025-5662 is substantial. Many enterprises, research institutions, and government agencies in Europe use H2O-3 for machine learning and data analytics, often integrating it with MySQL databases. Exploitation of this vulnerability could allow attackers to execute arbitrary code remotely, leading to full system compromise. This could result in theft or manipulation of sensitive data, disruption of critical analytics workflows, and potential lateral movement within networks. The confidentiality, integrity, and availability of data and services are all at risk. Given the criticality of data-driven decision-making in sectors such as finance, healthcare, manufacturing, and public administration across Europe, the consequences could include regulatory non-compliance (e.g., GDPR violations), financial losses, reputational damage, and operational downtime. The lack of authentication and user interaction requirements further increases the risk, as attackers can exploit exposed REST API endpoints directly over the network. Organizations using vulnerable versions of H2O-3 in production or development environments should consider this a high-priority threat.
Mitigation Recommendations
To mitigate CVE-2025-5662, European organizations should immediately upgrade to h2oai/h2o-3 version 3.46.0.8 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should restrict network access to the vulnerable REST API endpoints by implementing strict firewall rules and network segmentation to limit exposure only to trusted hosts. Additionally, monitoring and logging of API requests should be enhanced to detect anomalous or suspicious deserialization attempts. Organizations should verify that the MySQL JDBC Driver is updated beyond version 8.0.19 and that the JDK version is upgraded beyond 8u112 to versions that address known deserialization issues. Employing runtime application self-protection (RASP) or web application firewalls (WAF) with deserialization attack detection capabilities can provide additional layers of defense. Finally, organizations should conduct thorough audits of their H2O-3 deployments and associated data pipelines to identify any signs of compromise and ensure secure configuration management practices are in place for all machine learning infrastructure components.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland, Italy
CVE-2025-5662: CWE-502 Deserialization of Untrusted Data in h2oai h2oai/h2o-3
Description
A deserialization vulnerability exists in the H2O-3 REST API (POST /99/ImportSQLTable) that affects all versions up to 3.46.0.7. This vulnerability allows remote code execution (RCE) due to improper validation of JDBC connection parameters when using a Key-Value format. The vulnerability is present in the MySQL JDBC Driver version 8.0.19 and JDK version 8u112. The issue is resolved in version 3.46.0.8.
AI-Powered Analysis
Technical Analysis
CVE-2025-5662 is a critical deserialization vulnerability (CWE-502) affecting the H2O-3 machine learning platform's REST API, specifically the POST /99/ImportSQLTable endpoint. This vulnerability exists in all versions of h2oai/h2o-3 up to 3.46.0.7. The root cause is improper validation of JDBC connection parameters when provided in a Key-Value format, which allows an attacker to craft malicious serialized data that the system deserializes without adequate checks. The vulnerability leverages the MySQL JDBC Driver version 8.0.19 and JDK version 8u112, both of which are components involved in processing the JDBC connection parameters. Successful exploitation leads to remote code execution (RCE) without requiring authentication or user interaction, making it highly dangerous. The vulnerability has a CVSS v3.0 score of 9.8, indicating critical severity with network attack vector, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. The issue was resolved in h2o-3 version 3.46.0.8. No known exploits are currently reported in the wild, but the ease of exploitation and severity suggest that attackers may develop exploits rapidly. The vulnerability affects systems running the vulnerable versions of H2O-3 that integrate with MySQL databases using the specified JDBC driver and JDK versions. Given the nature of H2O-3 as a widely used open-source machine learning platform, this vulnerability poses a significant risk to data science and analytics environments that rely on it for data import and processing.
Potential Impact
For European organizations, the impact of CVE-2025-5662 is substantial. Many enterprises, research institutions, and government agencies in Europe use H2O-3 for machine learning and data analytics, often integrating it with MySQL databases. Exploitation of this vulnerability could allow attackers to execute arbitrary code remotely, leading to full system compromise. This could result in theft or manipulation of sensitive data, disruption of critical analytics workflows, and potential lateral movement within networks. The confidentiality, integrity, and availability of data and services are all at risk. Given the criticality of data-driven decision-making in sectors such as finance, healthcare, manufacturing, and public administration across Europe, the consequences could include regulatory non-compliance (e.g., GDPR violations), financial losses, reputational damage, and operational downtime. The lack of authentication and user interaction requirements further increases the risk, as attackers can exploit exposed REST API endpoints directly over the network. Organizations using vulnerable versions of H2O-3 in production or development environments should consider this a high-priority threat.
Mitigation Recommendations
To mitigate CVE-2025-5662, European organizations should immediately upgrade to h2oai/h2o-3 version 3.46.0.8 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should restrict network access to the vulnerable REST API endpoints by implementing strict firewall rules and network segmentation to limit exposure only to trusted hosts. Additionally, monitoring and logging of API requests should be enhanced to detect anomalous or suspicious deserialization attempts. Organizations should verify that the MySQL JDBC Driver is updated beyond version 8.0.19 and that the JDK version is upgraded beyond 8u112 to versions that address known deserialization issues. Employing runtime application self-protection (RASP) or web application firewalls (WAF) with deserialization attack detection capabilities can provide additional layers of defense. Finally, organizations should conduct thorough audits of their H2O-3 deployments and associated data pipelines to identify any signs of compromise and ensure secure configuration management practices are in place for all machine learning infrastructure components.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-06-04T12:47:05.500Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68b6d5e9ad5a09ad00dbf90b
Added to database: 9/2/2025, 11:32:57 AM
Last enriched: 9/2/2025, 11:47:46 AM
Last updated: 9/2/2025, 12:34:19 PM
Views: 4
Related Threats
CVE-2025-9784: Vulnerability in Red Hat Red Hat build of Apache Camel for Spring Boot 4
HighCVE-2025-2413: CWE-307 Improper Restriction of Excessive Authentication Attempts in Akinsoft ProKuafor
HighCVE-2025-46047: n/a
MediumCVE-2025-0670: CWE-639 Authorization Bypass Through User-Controlled Key in Akinsoft ProKuafor
MediumCVE-2025-57140: n/a
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.