← Back to CVEs
CVE-2025-48999
HIGH8.8
Description
DataEase is an open source business intelligence and data visualization tool. A bypass of CVE-2025-46566's patch exists in versions prior to 2.10.10. In a malicious payload, `getUrlType()` retrieves `hostName`. Since the judgment statement returns false, it will not enter the if statement and will not be filtered. The payload can be directly concatenated at the replace location to construct a malicious JDBC statement. Version 2.10.10 contains a patch for the issue.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published6/3/2025
Last Modified6/5/2025
Sourcenvd
Honeypot Sightings0
Affected Products
dataease:dataease
Weaknesses (CWE)
CWE-284CWE-923
References
https://github.com/dataease/dataease/commit/03b18db8a0fb7e9dc2c44f6d26d8c6221b7748c4(security-advisories@github.com)
https://github.com/dataease/dataease/security/advisories/GHSA-6pq2-6q8x-mp2r(security-advisories@github.com)
https://github.com/dataease/dataease/security/advisories/GHSA-6pq2-6q8x-mp2r(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.