Skip to main content

CVE-2025-5662: CWE-502 Deserialization of Untrusted Data in h2oai h2oai/h2o-3

Critical
VulnerabilityCVE-2025-5662cvecve-2025-5662cwe-502
Published: Tue Sep 02 2025 (09/02/2025, 11:14:52 UTC)
Source: CVE Database V5
Vendor/Project: h2oai
Product: h2oai/h2o-3

Description

A deserialization vulnerability exists in the H2O-3 REST API (POST /99/ImportSQLTable) that affects all versions up to 3.46.0.7. This vulnerability allows remote code execution (RCE) due to improper validation of JDBC connection parameters when using a Key-Value format. The vulnerability is present in the MySQL JDBC Driver version 8.0.19 and JDK version 8u112. The issue is resolved in version 3.46.0.8.

AI-Powered Analysis

AILast updated: 09/02/2025, 11:47:46 UTC

Technical Analysis

CVE-2025-5662 is a critical deserialization vulnerability (CWE-502) affecting the H2O-3 machine learning platform's REST API, specifically the POST /99/ImportSQLTable endpoint. This vulnerability exists in all versions of h2oai/h2o-3 up to 3.46.0.7. The root cause is improper validation of JDBC connection parameters when provided in a Key-Value format, which allows an attacker to craft malicious serialized data that the system deserializes without adequate checks. The vulnerability leverages the MySQL JDBC Driver version 8.0.19 and JDK version 8u112, both of which are components involved in processing the JDBC connection parameters. Successful exploitation leads to remote code execution (RCE) without requiring authentication or user interaction, making it highly dangerous. The vulnerability has a CVSS v3.0 score of 9.8, indicating critical severity with network attack vector, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. The issue was resolved in h2o-3 version 3.46.0.8. No known exploits are currently reported in the wild, but the ease of exploitation and severity suggest that attackers may develop exploits rapidly. The vulnerability affects systems running the vulnerable versions of H2O-3 that integrate with MySQL databases using the specified JDBC driver and JDK versions. Given the nature of H2O-3 as a widely used open-source machine learning platform, this vulnerability poses a significant risk to data science and analytics environments that rely on it for data import and processing.

Potential Impact

For European organizations, the impact of CVE-2025-5662 is substantial. Many enterprises, research institutions, and government agencies in Europe use H2O-3 for machine learning and data analytics, often integrating it with MySQL databases. Exploitation of this vulnerability could allow attackers to execute arbitrary code remotely, leading to full system compromise. This could result in theft or manipulation of sensitive data, disruption of critical analytics workflows, and potential lateral movement within networks. The confidentiality, integrity, and availability of data and services are all at risk. Given the criticality of data-driven decision-making in sectors such as finance, healthcare, manufacturing, and public administration across Europe, the consequences could include regulatory non-compliance (e.g., GDPR violations), financial losses, reputational damage, and operational downtime. The lack of authentication and user interaction requirements further increases the risk, as attackers can exploit exposed REST API endpoints directly over the network. Organizations using vulnerable versions of H2O-3 in production or development environments should consider this a high-priority threat.

Mitigation Recommendations

To mitigate CVE-2025-5662, European organizations should immediately upgrade to h2oai/h2o-3 version 3.46.0.8 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should restrict network access to the vulnerable REST API endpoints by implementing strict firewall rules and network segmentation to limit exposure only to trusted hosts. Additionally, monitoring and logging of API requests should be enhanced to detect anomalous or suspicious deserialization attempts. Organizations should verify that the MySQL JDBC Driver is updated beyond version 8.0.19 and that the JDK version is upgraded beyond 8u112 to versions that address known deserialization issues. Employing runtime application self-protection (RASP) or web application firewalls (WAF) with deserialization attack detection capabilities can provide additional layers of defense. Finally, organizations should conduct thorough audits of their H2O-3 deployments and associated data pipelines to identify any signs of compromise and ensure secure configuration management practices are in place for all machine learning infrastructure components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2025-06-04T12:47:05.500Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68b6d5e9ad5a09ad00dbf90b

Added to database: 9/2/2025, 11:32:57 AM

Last enriched: 9/2/2025, 11:47:46 AM

Last updated: 9/2/2025, 12:34:19 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats