DataEase is a data visualization and analytics platform. In DataEase versions through 2.10.13, a JDBC URL injection vulnerability exists in the DB2 and MongoDB data source configuration handlers. In the DB2 data source handler, when the extraParams field is empty, the HOSTNAME, PORT, and DATABASE values are directly concatenated into the JDBC URL without filtering illegal parameters. This allows an attacker to inject a malicious JDBC string into the HOSTNAME field to bypass previously patched vulnerabilities CVE-2025-57773 and CVE-2025-58045. The vulnerability is fixed in version 2.10.14. No known workarounds exist.
References
Configurations
History
24 Oct 2025, 16:56
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/dataease/dataease/commit/bb320e42bf2cf862b9c4b438c1517547b53ed67b - Patch | |
| References | () https://github.com/dataease/dataease/security/advisories/GHSA-x4x9-mjcf-99r9 - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| First Time |
Dataease dataease
Dataease |
|
| CPE | cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:* |
17 Oct 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-17 18:15
Updated : 2025-10-24 16:56
NVD link : CVE-2025-62419
Mitre link : CVE-2025-62419
CVE.ORG link : CVE-2025-62419
JSON object : View
Products Affected
dataease
- dataease
CWE
CWE-502
Deserialization of Untrusted Data
