Description
Metabase is an open source business intelligence and embedded analytics tool. In Metabase Enterprise prior to versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4, authenticated admins on Metabase Enterprise Edition can achieve Remote Code Execution (RCE) and Arbitrary File Read via the `POST /api/ee/serialization/import` endpoint. A crafted serialization archive injects an `INIT` property into the H2 JDBC spec, which can execute arbitrary SQL during a database sync. We confirmed this was possible on Metabase Cloud. This only affects Metabase Enterprise. Metabase OSS lacks the affected codepaths. All versions of Metabase Enterprise that have serialization, which dates back to at least version 1.47, are affected. Metabase Enterprise versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4 patch the issue. As a workaround, disable the serialization import endpoint in their Metabase instance to prevent access to the vulnerable codepaths.
Published: 2026-03-27
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

Metabase is a business intelligence tool that allows authenticated administrators to import serialized archives. A crafted archive can inject an INIT property into the H2 JDBC specification, which is executed during a database synchronization. This injection enables an attacker to run arbitrary SQL, leading to remote code execution and the ability to read arbitrary files, and it has been confirmed to work on Metabase Cloud.

Affected Systems

The vulnerability affects Metabase Enterprise Edition only. Versions from 1.47 up to, but not including, 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4 are susceptible. The latest patched releases are 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4. The open‑source edition does not contain the vulnerable code paths.

Risk and Exploitability

This issue has a CVSS score of 7.2 and an EPSS score of less than 1 percent, indicating moderate severity and a low probability of widespread exploitation. It is not listed in the CISA Known Exploited Vulnerabilities catalog. Attackers must first authenticate as an administrator and use the POST /api/ee/serialization/import endpoint to deliver the malicious payload, so the attack requires privileged access and a deliberate upload action.

Generated by OpenCVE AI on April 2, 2026 at 04:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Metabase Enterprise to version 1.54.22 or later, which fixes the serialization import vulnerability.
  • If an upgrade cannot be performed immediately, disable the /api/ee/serialization/import endpoint to block access to the vulnerable code path.
  • Verify the endpoint is inaccessible to unauthenticated users and that the serialization import functionality is not exposed.
  • Keep monitoring logs for any attempts to use the import endpoint or for unusual database activity.

Generated by OpenCVE AI on April 2, 2026 at 04:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:metabase:metabase:*:*:*:*:enterprise:*:*:*

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Metabase
Metabase metabase
Vendors & Products Metabase
Metabase metabase

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description Metabase is an open source business intelligence and embedded analytics tool. In Metabase Enterprise prior to versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4, authenticated admins on Metabase Enterprise Edition can achieve Remote Code Execution (RCE) and Arbitrary File Read via the `POST /api/ee/serialization/import` endpoint. A crafted serialization archive injects an `INIT` property into the H2 JDBC spec, which can execute arbitrary SQL during a database sync. We confirmed this was possible on Metabase Cloud. This only affects Metabase Enterprise. Metabase OSS lacks the affected codepaths. All versions of Metabase Enterprise that have serialization, which dates back to at least version 1.47, are affected. Metabase Enterprise versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4 patch the issue. As a workaround, disable the serialization import endpoint in their Metabase instance to prevent access to the vulnerable codepaths.
Title Metabase vulnerable to RCE and Arbitrary File Read via H2 JDBC INIT Injection in EE Serialization Import
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Metabase Metabase
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-28T03:55:51.956Z

Reserved: 2026-03-23T17:34:57.559Z

Link: CVE-2026-33725

cve-icon Vulnrichment

Updated: 2026-03-27T13:26:48.080Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T01:16:19.837

Modified: 2026-04-01T15:57:59.100

Link: CVE-2026-33725

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:55:54Z

Weaknesses