Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9121: CWE-502 Deserialization of Untrusted Data in Hitachi Vantara Pentaho Data Integration and Analytics

0
High
VulnerabilityCVE-2025-9121cvecve-2025-9121cwe-502
Published: Mon Dec 15 2025 (12/15/2025, 22:53:57 UTC)
Source: CVE Database V5
Vendor/Project: Hitachi Vantara
Product: Pentaho Data Integration and Analytics

Description

Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:59:23 UTC

Technical Analysis

CVE-2025-9121 is a deserialization vulnerability classified under CWE-502 affecting Hitachi Vantara's Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x. The vulnerability arises because the software deserializes JSON data from untrusted sources without constraining the deserialization process to a safe set of classes and methods. This unsafe deserialization can allow an attacker to craft malicious JSON payloads that, when processed, execute arbitrary code on the server hosting the Pentaho application. The vulnerability requires network access and low privileges (PR:L) but does not require user interaction (UI:N), making it easier to exploit remotely. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. No patches or exploit code are currently publicly available, but the risk is significant given the nature of deserialization flaws and the critical role of Pentaho in data analytics environments. The vulnerability was reserved in August 2025 and published in December 2025. The lack of constraints on deserialization means attackers can potentially execute arbitrary commands, steal sensitive data, or disrupt analytics operations.

Potential Impact

This vulnerability poses a serious risk to organizations relying on Pentaho Data Integration and Analytics for business intelligence and data processing. Successful exploitation could lead to remote code execution, allowing attackers to take full control of the affected system. This can result in data breaches exposing sensitive business intelligence data, manipulation or destruction of analytics results, and disruption of critical data workflows. The compromise of analytics infrastructure can have cascading effects on decision-making processes and operational continuity. Given the network accessibility and low privilege requirements, attackers could exploit this vulnerability to establish persistent footholds or move laterally within enterprise networks. The high CVSS score underscores the potential for severe confidentiality, integrity, and availability impacts. Organizations in sectors such as finance, healthcare, manufacturing, and government that utilize Pentaho are particularly at risk due to the sensitive nature of their data and reliance on analytics platforms.

Mitigation Recommendations

Organizations should immediately inventory their Pentaho deployments to identify affected versions prior to 10.2.0.4. Although no official patches are currently listed, monitoring Hitachi Vantara advisories for updates is critical. In the interim, restrict network access to Pentaho services by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. Employ application-layer controls such as web application firewalls (WAFs) with custom rules to detect and block suspicious JSON payloads. Implement strict input validation and sanitization on any data sources feeding into Pentaho dashboards. Consider deploying runtime application self-protection (RASP) solutions to detect anomalous deserialization behavior. Limit privileges of the Pentaho service account to the minimum necessary to reduce impact if compromised. Conduct regular security assessments and penetration testing focused on deserialization vectors. Finally, prepare incident response plans specific to analytics platform compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
HITVAN
Date Reserved
2025-08-18T18:06:38.505Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69409306d9bcdf3f3d07fefc

Added to database: 12/15/2025, 11:00:22 PM

Last enriched: 2/27/2026, 6:59:23 AM

Last updated: 3/24/2026, 6:09:40 PM

Views: 130

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses