Unrated severityNVD Advisory· Published Oct 17, 2025· Updated Oct 17, 2025
DataEase vulnerable to JDBC URL injection in DB2 and MongoDB data source configuration
CVE-2025-62419
Description
DataEase is a data visualization and analytics platform. In DataEase versions through 2.10.13, a JDBC URL injection vulnerability exists in the DB2 and MongoDB data source configuration handlers. In the DB2 data source handler, when the extraParams field is empty, the HOSTNAME, PORT, and DATABASE values are directly concatenated into the JDBC URL without filtering illegal parameters. This allows an attacker to inject a malicious JDBC string into the HOSTNAME field to bypass previously patched vulnerabilities CVE-2025-57773 and CVE-2025-58045. The vulnerability is fixed in version 2.10.14. No known workarounds exist.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/dataease/dataease/commit/bb320e42bf2cf862b9c4b438c1517547b53ed67bmitrex_refsource_MISC
- github.com/dataease/dataease/security/advisories/GHSA-x4x9-mjcf-99r9mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.