Description
A deserialization vulnerability exists in the H2O-3 REST API (POST /99/ImportSQLTable) that affects all versions up to 3.46.0.7. This vulnerability allows remote code execution (RCE) due to improper validation of JDBC connection parameters when using a Key-Value format. The vulnerability is present in the MySQL JDBC Driver version 8.0.19 and JDK version 8u112. The issue is resolved in version 3.46.0.8.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://huntr.com/bounties/057a743b-b2ec-4312-8262-ce0ff8bc161c
Scores
CVSS v3
9.8
EPSS
0.0210
EPSS Percentile
84.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-502
Status
published
Products (1)
h2oai/h2oai/h2o-3
unspecified - 3.46.0.8
Published
Sep 02, 2025
Tracked Since
Feb 18, 2026