CVE-2025-58748

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote code execution in Dataease by exploiting improper JDBC URL validation in the H2 data source implementation. Attackers can craft malicious JDBC configurations to load and execute arbitrary XML resources, leading to full system compromise. All Dataease installations up to version 2.10.12 are affected.

💻 Affected Systems

Products:
  • Dataease
Versions: Up to and including 2.10.12
Operating Systems: All platforms running Dataease
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using the H2 data source feature are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining full control over the Dataease server, allowing data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to data exfiltration, cryptocurrency mining, or ransomware deployment on vulnerable systems.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and strict input validation is implemented at network boundaries.

🌐 Internet-Facing: HIGH - Exploitation requires no authentication and can be triggered remotely via crafted JDBC configurations.
🏢 Internal Only: HIGH - Even internally accessible instances are vulnerable to authenticated or network-adjacent attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit once the attack vector is understood, requiring only the ability to configure a data source in Dataease.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.13

Vendor Advisory: https://github.com/dataease/dataease/security/advisories/GHSA-23qw-9qrh-9rr8

Restart Required: Yes

Instructions:

1. Backup your Dataease configuration and data. 2. Download Dataease version 2.10.13 or later from the official repository. 3. Stop the Dataease service. 4. Replace the existing installation with the patched version. 5. Restart the Dataease service. 6. Verify the version is 2.10.13 or higher.

🧯 If You Can't Patch

  • Disable external access to Dataease by implementing strict network segmentation and firewall rules.
  • Monitor for suspicious JDBC configuration changes and XML resource loading attempts in application logs.

🔍 How to Verify

Check if Vulnerable:

Check the Dataease version via the web interface admin panel or by examining the application version file in the installation directory.

Check Version:

Check the version in the Dataease web interface under Admin > System Info, or look for version information in the application logs or configuration files.

Verify Fix Applied:

Confirm the version is 2.10.13 or higher and test that H2 data source configurations now properly validate JDBC URLs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JDBC URL patterns in Dataease logs
  • Attempts to load XML resources from remote locations
  • FileSystemXmlApplicationContext or ClassPathXmlApplicationContext initialization with external URLs

Network Indicators:

  • Outbound connections from Dataease server to unexpected external XML resources
  • JDBC configuration requests with non-standard parameters

SIEM Query:

source="dataease" AND ("jdbc:h2" NOT "jdbc:h2:" OR "socketFactory" OR "FileSystemXmlApplicationContext" OR "ClassPathXmlApplicationContext")

🔗 References

📤 Share & Export