Impact
Metabase Enterprise versions before 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4 allow an authenticated administrator to inject an INIT property into an H2 JDBC connection string via a crafted serialization archive. The injected parameter causes the database engine to execute arbitrary SQL during a sync, which can in turn trigger Remote Code Execution and arbitrary file reads. The weakness is classified as an insecure deserialization (CWE‑502). The potential impact is that a privileged attacker can run arbitrary code on the host and read sensitive files, effectively compromising the entire system.
Affected Systems
The vulnerability affects Metabase Enterprise Edition only. All Enterprise releases with serialization support from version 1.47 onward are vulnerable, including Metabase Cloud instances. Metabase OSS does not contain the affected code paths. Patched versions start with 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4.
Risk and Exploitability
The CVSS score is 7.2, indicating high severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploit requires authenticated administrator access to the /api/ee/serialization/import endpoint and the ability to upload a malicious archive. An attacker with these privileges can trigger the injection and execute arbitrary code, presenting a significant risk to confidentiality, integrity, and availability of the host system.
OpenCVE Enrichment