CVE-2025-5662: CWE-502 Deserialization of Untrusted Data in h2oai h2oai/h2o-3
A deserialization vulnerability exists in the H2O-3 REST API (POST /99/ImportSQLTable) that affects all versions up to 3.46.0.7. This vulnerability allows remote code execution (RCE) due to improper validation of JDBC connection parameters when using a Key-Value format. The vulnerability is present in the MySQL JDBC Driver version 8.0.19 and JDK version 8u112. The issue is resolved in version 3.46.0.8.
AI Analysis
Technical Summary
CVE-2025-5662 is a critical deserialization vulnerability (CWE-502) affecting the H2O-3 machine learning platform's REST API, specifically the POST /99/ImportSQLTable endpoint. This vulnerability exists in all versions of h2oai/h2o-3 up to 3.46.0.7. The root cause is improper validation of JDBC connection parameters when provided in a Key-Value format, which allows an attacker to craft malicious serialized data that the system deserializes without adequate checks. The vulnerability leverages the MySQL JDBC Driver version 8.0.19 and JDK version 8u112, both of which are components involved in processing the JDBC connection parameters. Successful exploitation leads to remote code execution (RCE) without requiring authentication or user interaction, making it highly dangerous. The vulnerability has a CVSS v3.0 score of 9.8, indicating critical severity with network attack vector, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. The issue was resolved in h2o-3 version 3.46.0.8. No known exploits are currently reported in the wild, but the ease of exploitation and severity suggest that attackers may develop exploits rapidly. The vulnerability affects systems running the vulnerable versions of H2O-3 that integrate with MySQL databases using the specified JDBC driver and JDK versions. Given the nature of H2O-3 as a widely used open-source machine learning platform, this vulnerability poses a significant risk to data science and analytics environments that rely on it for data import and processing.
Potential Impact
For European organizations, the impact of CVE-2025-5662 is substantial. Many enterprises, research institutions, and government agencies in Europe use H2O-3 for machine learning and data analytics, often integrating it with MySQL databases. Exploitation of this vulnerability could allow attackers to execute arbitrary code remotely, leading to full system compromise. This could result in theft or manipulation of sensitive data, disruption of critical analytics workflows, and potential lateral movement within networks. The confidentiality, integrity, and availability of data and services are all at risk. Given the criticality of data-driven decision-making in sectors such as finance, healthcare, manufacturing, and public administration across Europe, the consequences could include regulatory non-compliance (e.g., GDPR violations), financial losses, reputational damage, and operational downtime. The lack of authentication and user interaction requirements further increases the risk, as attackers can exploit exposed REST API endpoints directly over the network. Organizations using vulnerable versions of H2O-3 in production or development environments should consider this a high-priority threat.
Mitigation Recommendations
To mitigate CVE-2025-5662, European organizations should immediately upgrade to h2oai/h2o-3 version 3.46.0.8 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should restrict network access to the vulnerable REST API endpoints by implementing strict firewall rules and network segmentation to limit exposure only to trusted hosts. Additionally, monitoring and logging of API requests should be enhanced to detect anomalous or suspicious deserialization attempts. Organizations should verify that the MySQL JDBC Driver is updated beyond version 8.0.19 and that the JDK version is upgraded beyond 8u112 to versions that address known deserialization issues. Employing runtime application self-protection (RASP) or web application firewalls (WAF) with deserialization attack detection capabilities can provide additional layers of defense. Finally, organizations should conduct thorough audits of their H2O-3 deployments and associated data pipelines to identify any signs of compromise and ensure secure configuration management practices are in place for all machine learning infrastructure components.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Switzerland, Italy
CVE-2025-5662: CWE-502 Deserialization of Untrusted Data in h2oai h2oai/h2o-3
Description
A deserialization vulnerability exists in the H2O-3 REST API (POST /99/ImportSQLTable) that affects all versions up to 3.46.0.7. This vulnerability allows remote code execution (RCE) due to improper validation of JDBC connection parameters when using a Key-Value format. The vulnerability is present in the MySQL JDBC Driver version 8.0.19 and JDK version 8u112. The issue is resolved in version 3.46.0.8.
AI-Powered Analysis
Technical Analysis
CVE-2025-5662 is a critical deserialization vulnerability (CWE-502) affecting the H2O-3 machine learning platform's REST API, specifically the POST /99/ImportSQLTable endpoint. This vulnerability exists in all versions of h2oai/h2o-3 up to 3.46.0.7. The root cause is improper validation of JDBC connection parameters when provided in a Key-Value format, which allows an attacker to craft malicious serialized data that the system deserializes without adequate checks. The vulnerability leverages the MySQL JDBC Driver version 8.0.19 and JDK version 8u112, both of which are components involved in processing the JDBC connection parameters. Successful exploitation leads to remote code execution (RCE) without requiring authentication or user interaction, making it highly dangerous. The vulnerability has a CVSS v3.0 score of 9.8, indicating critical severity with network attack vector, no privileges required, no user interaction, and full impact on confidentiality, integrity, and availability. The issue was resolved in h2o-3 version 3.46.0.8. No known exploits are currently reported in the wild, but the ease of exploitation and severity suggest that attackers may develop exploits rapidly. The vulnerability affects systems running the vulnerable versions of H2O-3 that integrate with MySQL databases using the specified JDBC driver and JDK versions. Given the nature of H2O-3 as a widely used open-source machine learning platform, this vulnerability poses a significant risk to data science and analytics environments that rely on it for data import and processing.
Potential Impact
For European organizations, the impact of CVE-2025-5662 is substantial. Many enterprises, research institutions, and government agencies in Europe use H2O-3 for machine learning and data analytics, often integrating it with MySQL databases. Exploitation of this vulnerability could allow attackers to execute arbitrary code remotely, leading to full system compromise. This could result in theft or manipulation of sensitive data, disruption of critical analytics workflows, and potential lateral movement within networks. The confidentiality, integrity, and availability of data and services are all at risk. Given the criticality of data-driven decision-making in sectors such as finance, healthcare, manufacturing, and public administration across Europe, the consequences could include regulatory non-compliance (e.g., GDPR violations), financial losses, reputational damage, and operational downtime. The lack of authentication and user interaction requirements further increases the risk, as attackers can exploit exposed REST API endpoints directly over the network. Organizations using vulnerable versions of H2O-3 in production or development environments should consider this a high-priority threat.
Mitigation Recommendations
To mitigate CVE-2025-5662, European organizations should immediately upgrade to h2oai/h2o-3 version 3.46.0.8 or later, where the vulnerability is patched. If immediate upgrade is not feasible, organizations should restrict network access to the vulnerable REST API endpoints by implementing strict firewall rules and network segmentation to limit exposure only to trusted hosts. Additionally, monitoring and logging of API requests should be enhanced to detect anomalous or suspicious deserialization attempts. Organizations should verify that the MySQL JDBC Driver is updated beyond version 8.0.19 and that the JDK version is upgraded beyond 8u112 to versions that address known deserialization issues. Employing runtime application self-protection (RASP) or web application firewalls (WAF) with deserialization attack detection capabilities can provide additional layers of defense. Finally, organizations should conduct thorough audits of their H2O-3 deployments and associated data pipelines to identify any signs of compromise and ensure secure configuration management practices are in place for all machine learning infrastructure components.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-06-04T12:47:05.500Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68b6d5e9ad5a09ad00dbf90b
Added to database: 9/2/2025, 11:32:57 AM
Last enriched: 9/2/2025, 11:47:46 AM
Last updated: 10/18/2025, 8:11:35 PM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Notice: Google Gemini AI's Undisclosed 911 Auto-Dial Bypass – Logs and Evidence Available
CriticalCVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownCVE-2025-11926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdreams Related Posts Lite
MediumCVE-2025-9890: CWE-352 Cross-Site Request Forgery (CSRF) in mndpsingh287 Theme Editor
HighCVE-2025-5555: Stack-based Buffer Overflow in Nixdorf Wincor PORT IO Driver
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.