Impact
Metabase is a business intelligence tool that allows authenticated administrators to import serialized archives. A crafted archive can inject an INIT property into the H2 JDBC specification, which is executed during a database synchronization. This injection enables an attacker to run arbitrary SQL, leading to remote code execution and the ability to read arbitrary files, and it has been confirmed to work on Metabase Cloud.
Affected Systems
The vulnerability affects Metabase Enterprise Edition only. Versions from 1.47 up to, but not including, 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4 are susceptible. The latest patched releases are 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4. The open‑source edition does not contain the vulnerable code paths.
Risk and Exploitability
This issue has a CVSS score of 7.2 and an EPSS score of less than 1 percent, indicating moderate severity and a low probability of widespread exploitation. It is not listed in the CISA Known Exploited Vulnerabilities catalog. Attackers must first authenticate as an administrator and use the POST /api/ee/serialization/import endpoint to deliver the malicious payload, so the attack requires privileged access and a deliberate upload action.
OpenCVE Enrichment