CVE-2026-33725

HIGH

Metabase vulnerable to RCE and Arbitrary File Read via H2 JDBC INIT Injection in EE Serialization Import

Title source: cna

Description

Metabase is an open source business intelligence and embedded analytics tool. In Metabase Enterprise prior to versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4, authenticated admins on Metabase Enterprise Edition can achieve Remote Code Execution (RCE) and Arbitrary File Read via the `POST /api/ee/serialization/import` endpoint. A crafted serialization archive injects an `INIT` property into the H2 JDBC spec, which can execute arbitrary SQL during a database sync. We confirmed this was possible on Metabase Cloud. This only affects Metabase Enterprise. Metabase OSS lacks the affected codepaths. All versions of Metabase Enterprise that have serialization, which dates back to at least version 1.47, are affected. Metabase Enterprise versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4 patch the issue. As a workaround, disable the serialization import endpoint in their Metabase instance to prevent access to the vulnerable codepaths.

Exploits (1)

nomisec WORKING POC 6 stars
by hakaioffsec · poc
https://github.com/hakaioffsec/CVE-2026-33725

Scores

CVSS v3 7.2
EPSS 0.0016
EPSS Percentile 36.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-502
Status published
Products (6)
metabase/metabase < 1.54.22 (2 CPE variants)
metabase/metabase >= 1.55.0, < 1.55.22
metabase/metabase >= 1.56.0, < 1.56.22
metabase/metabase >= 1.57.0, < 1.57.16
metabase/metabase >= 1.58.0, < 1.58.10
metabase/metabase >= 1.59.0, < 1.59.4
Published Mar 27, 2026
Tracked Since Mar 27, 2026