CVE-2025-5874: Sandbox Issue in Redash
A vulnerability was found in Redash up to 10.1.0/25.1.0. It has been rated as problematic. This issue affects the function run_query of the file /query_runner/python.py of the component getattr Handler. The manipulation leads to sandbox issue. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains, that "[t]he Python data source is disabled by default and is clearly marked in our documentation as discouraged due to its security implications. Users who choose to enable it are doing so at their own risk, with full awareness that it bypasses standard safeguards."
AI Analysis
Technical Summary
CVE-2025-5874 is a vulnerability identified in Redash versions up to 10.1.0 and 25.1.0, specifically affecting the run_query function within the /query_runner/python.py file. The vulnerability is related to a sandbox issue in the getattr handler, which could potentially allow an attacker to bypass sandbox restrictions. However, exploitation complexity is high, and the attack is considered difficult to execute. The vulnerability arises from the Python data source feature in Redash, which is disabled by default and explicitly discouraged in official documentation due to inherent security risks. Users who enable this feature do so with full awareness that it bypasses standard security safeguards. The vulnerability has a low CVSS 4.0 score of 2.1, reflecting low severity, with attack vector being adjacent network, high attack complexity, no user interaction required, and low impact on confidentiality, integrity, and availability. There are no known exploits in the wild, and the vendor has not provided patches yet. The public disclosure of the exploit exists, but the actual exploitability and impact remain questionable. Overall, this vulnerability represents a limited risk primarily to environments that have explicitly enabled the Python data source in Redash, which is not the default configuration due to its security implications.
Potential Impact
For European organizations, the impact of CVE-2025-5874 is likely minimal under typical deployment scenarios because the vulnerable Python data source feature is disabled by default and clearly marked as insecure. Organizations that have enabled this feature to run custom Python queries within Redash could face risks of sandbox escape, potentially leading to unauthorized code execution or data access within the Redash environment. This could compromise the confidentiality and integrity of query results or underlying data sources. However, given the high complexity of exploitation and the absence of known active exploits, the immediate threat level is low. The vulnerability could be more relevant for organizations heavily reliant on Redash for business intelligence and data analytics, especially those integrating Python scripts for advanced querying. In such cases, a successful exploit might allow attackers to execute arbitrary code or access sensitive data, potentially impacting data-driven decision-making processes. Nonetheless, the overall risk remains constrained by the feature's disabled-by-default status and the requirement for local or adjacent network access with low privileges.
Mitigation Recommendations
European organizations using Redash should ensure that the Python data source feature remains disabled unless absolutely necessary. If enabling this feature is required, it should be done only in tightly controlled environments with strict access controls and network segmentation to limit exposure. Monitoring and logging of query execution should be enhanced to detect any anomalous or unauthorized Python code execution. Organizations should apply the principle of least privilege to Redash users, restricting permissions to only those who require Python data source capabilities. Additionally, organizations should stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available. Implementing network-level controls to restrict access to Redash instances from trusted hosts only can further reduce risk. Finally, conducting security reviews and penetration tests focusing on Redash configurations and custom query execution can help identify and remediate potential exploitation paths.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-2025-5874: Sandbox Issue in Redash
Description
A vulnerability was found in Redash up to 10.1.0/25.1.0. It has been rated as problematic. This issue affects the function run_query of the file /query_runner/python.py of the component getattr Handler. The manipulation leads to sandbox issue. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains, that "[t]he Python data source is disabled by default and is clearly marked in our documentation as discouraged due to its security implications. Users who choose to enable it are doing so at their own risk, with full awareness that it bypasses standard safeguards."
AI-Powered Analysis
Technical Analysis
CVE-2025-5874 is a vulnerability identified in Redash versions up to 10.1.0 and 25.1.0, specifically affecting the run_query function within the /query_runner/python.py file. The vulnerability is related to a sandbox issue in the getattr handler, which could potentially allow an attacker to bypass sandbox restrictions. However, exploitation complexity is high, and the attack is considered difficult to execute. The vulnerability arises from the Python data source feature in Redash, which is disabled by default and explicitly discouraged in official documentation due to inherent security risks. Users who enable this feature do so with full awareness that it bypasses standard security safeguards. The vulnerability has a low CVSS 4.0 score of 2.1, reflecting low severity, with attack vector being adjacent network, high attack complexity, no user interaction required, and low impact on confidentiality, integrity, and availability. There are no known exploits in the wild, and the vendor has not provided patches yet. The public disclosure of the exploit exists, but the actual exploitability and impact remain questionable. Overall, this vulnerability represents a limited risk primarily to environments that have explicitly enabled the Python data source in Redash, which is not the default configuration due to its security implications.
Potential Impact
For European organizations, the impact of CVE-2025-5874 is likely minimal under typical deployment scenarios because the vulnerable Python data source feature is disabled by default and clearly marked as insecure. Organizations that have enabled this feature to run custom Python queries within Redash could face risks of sandbox escape, potentially leading to unauthorized code execution or data access within the Redash environment. This could compromise the confidentiality and integrity of query results or underlying data sources. However, given the high complexity of exploitation and the absence of known active exploits, the immediate threat level is low. The vulnerability could be more relevant for organizations heavily reliant on Redash for business intelligence and data analytics, especially those integrating Python scripts for advanced querying. In such cases, a successful exploit might allow attackers to execute arbitrary code or access sensitive data, potentially impacting data-driven decision-making processes. Nonetheless, the overall risk remains constrained by the feature's disabled-by-default status and the requirement for local or adjacent network access with low privileges.
Mitigation Recommendations
European organizations using Redash should ensure that the Python data source feature remains disabled unless absolutely necessary. If enabling this feature is required, it should be done only in tightly controlled environments with strict access controls and network segmentation to limit exposure. Monitoring and logging of query execution should be enhanced to detect any anomalous or unauthorized Python code execution. Organizations should apply the principle of least privilege to Redash users, restricting permissions to only those who require Python data source capabilities. Additionally, organizations should stay alert for vendor patches or updates addressing this vulnerability and apply them promptly once available. Implementing network-level controls to restrict access to Redash instances from trusted hosts only can further reduce risk. Finally, conducting security reviews and penetration tests focusing on Redash configurations and custom query execution can help identify and remediate potential exploitation paths.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-08T17:53:18.632Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6846c7637b622a9fdf1f2a2c
Added to database: 6/9/2025, 11:37:07 AM
Last enriched: 7/16/2025, 8:37:11 PM
Last updated: 8/12/2025, 2:55:40 AM
Views: 25
Related Threats
CVE-2025-9028: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-26709: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE F50
MediumCVE-2025-9027: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-9026: OS Command Injection in D-Link DIR-860L
MediumCVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.