Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 17 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 17 Oct 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | DataEase is a data visualization and analytics platform. In DataEase versions through 2.10.13, a JDBC URL injection vulnerability exists in the DB2 and MongoDB data source configuration handlers. In the DB2 data source handler, when the extraParams field is empty, the HOSTNAME, PORT, and DATABASE values are directly concatenated into the JDBC URL without filtering illegal parameters. This allows an attacker to inject a malicious JDBC string into the HOSTNAME field to bypass previously patched vulnerabilities CVE-2025-57773 and CVE-2025-58045. The vulnerability is fixed in version 2.10.14. No known workarounds exist. | |
Title | DataEase vulnerable to JDBC URL injection in DB2 and MongoDB data source configuration | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-17T17:26:02.585Z
Reserved: 2025-10-13T16:26:12.179Z
Link: CVE-2025-62419

Updated: 2025-10-17T17:25:40.354Z

Status : Received
Published: 2025-10-17T18:15:37.310
Modified: 2025-10-17T18:15:37.310
Link: CVE-2025-62419

No data.

No data.