CVE-2025-9121

8.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through deserialization of untrusted JSON data in Pentaho's Community Dashboard Editor plugin. Attackers can exploit this to execute arbitrary code on affected systems. Organizations using Pentaho Data Integration and Analytics with the vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Pentaho Data Integration and Analytics Community Dashboard Editor plugin
Versions: Versions before 10.2.0.4, including 9.3.0.x and 8.3.x
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the plugin's JSON deserialization mechanism and affects all deployments using vulnerable versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary code, steal sensitive data, deploy ransomware, or pivot to other systems in the network.

🟠

Likely Case

Remote code execution leading to data exfiltration, installation of backdoors, or use of the compromised system for further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and monitoring are in place, though exploitation risk remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Deserialization vulnerabilities are commonly exploited and weaponized quickly once details become public.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.2.0.4

Vendor Advisory: https://support.pentaho.com/hc/en-us/articles/41832536185613--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Deserialization-of-Untrusted-Data-Versions-before-10-2-0-4-Impacted-CVE-2025-9121

Restart Required: Yes

Instructions:

1. Download Pentaho version 10.2.0.4 or later from official sources. 2. Backup current installation and data. 3. Apply the update following Pentaho's upgrade documentation. 4. Restart all Pentaho services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable Community Dashboard Editor plugin

all

Remove or disable the vulnerable plugin to prevent exploitation

Navigate to Pentaho installation directory
Remove or rename the community-dashboard-editor plugin folder
Restart Pentaho services

Network segmentation and access control

all

Restrict network access to Pentaho instances

Configure firewall rules to limit access to Pentaho servers
Implement IP whitelisting for administrative access
Use VPN for remote access

🧯 If You Can't Patch

  • Isolate affected systems in a segmented network zone with strict egress filtering
  • Implement application-level WAF rules to block suspicious JSON payloads and deserialization attempts

🔍 How to Verify

Check if Vulnerable:

Check Pentaho version and plugin version in administration console or by examining installation files

Check Version:

Check Pentaho version in web interface or examine version.properties file in installation directory

Verify Fix Applied:

Verify version is 10.2.0.4 or later and test JSON deserialization functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual Java deserialization errors in application logs
  • Suspicious POST requests with JSON payloads to dashboard endpoints
  • Unexpected process execution or network connections from Pentaho services

Network Indicators:

  • HTTP requests with unusual JSON structures to Pentaho dashboard endpoints
  • Outbound connections from Pentaho servers to unexpected destinations

SIEM Query:

source="pentaho" AND (event="deserialization" OR event="json_parse" OR status="500") AND (message="*ClassNotFoundException*" OR message="*InvalidClassException*")

🔗 References

📤 Share & Export