CVE-2025-27138

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass authentication in DataEase, potentially gaining unauthorized access to sensitive business intelligence data and visualization tools. All organizations running DataEase versions before 2.10.6 are affected. The flaw exists in the TokenFilter class's authentication mechanism.

💻 Affected Systems

Products:
  • DataEase
Versions: All versions prior to 2.10.6
Operating Systems: All platforms running DataEase
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to access, modify, or delete all business intelligence data, execute arbitrary code, and pivot to other systems.

🟠

Likely Case

Unauthorized access to sensitive business data, data exfiltration, and potential privilege escalation within the DataEase environment.

🟢

If Mitigated

Limited impact if strong network segmentation, monitoring, and additional authentication layers are in place.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly exploitable without authentication.
🏢 Internal Only: HIGH - Internal instances remain vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory suggests authentication bypass is possible without credentials. No public exploit code has been identified yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.6

Vendor Advisory: https://github.com/dataease/dataease/security/advisories/GHSA-533g-whf8-q637

Restart Required: Yes

Instructions:

1. Backup your DataEase configuration and data. 2. Stop the DataEase service. 3. Upgrade to version 2.10.6 using your package manager or manual installation. 4. Restart the DataEase service. 5. Verify the upgrade was successful.

🧯 If You Can't Patch

  • Isolate DataEase instances behind strict network segmentation and firewall rules.
  • Implement additional authentication layers such as VPN or reverse proxy with authentication.

🔍 How to Verify

Check if Vulnerable:

Check the DataEase version via web interface or configuration files. If version is below 2.10.6, the system is vulnerable.

Check Version:

Check DataEase web interface or configuration files for version information.

Verify Fix Applied:

Confirm the version is 2.10.6 or higher and test authentication mechanisms work properly.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns
  • Access from unexpected IP addresses
  • Failed authentication attempts followed by successful access

Network Indicators:

  • Unauthenticated requests to DataEase endpoints
  • Traffic patterns suggesting data exfiltration

SIEM Query:

source="dataease" AND (event_type="auth_failure" OR event_type="auth_success") | stats count by src_ip, user

🔗 References

📤 Share & Export