CVE-2026-8751
Description
A security flaw has been discovered in h2oai h2o-3 up to 7402. This affects the function importBinaryModel of the file h2o-core/src/main/java/hex/Model.java of the component JAR Handler. Performing a manipulation results in deserialization. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
H2O-3 (up to 7402) deserializes untrusted binary models pre-authentication, allowing remote code execution via a malicious custom_metric_func JAR.
Vulnerability
Overview
CVE-2026-8751 describes a pre-authentication insecure deserialization vulnerability in the H2O-3 machine learning platform. The flaw resides in the importBinaryModel function within h2o-core/src/main/java/hex/Model.java. By importing a crafted binary model, an attacker can restore a serialized reference to a custom_metric_func that points to an attacker-controlled JAR previously stored in the distributed key-value store (DKV). [1]
Exploitation
The attacker first uploads a malicious JAR to DKV via an unauthenticated PUT request, then trains a model that uses the JAR as a custom metric function (custom_metric_func=java:<jarKey>=<class>) and exports the model as a binary file. The binary model is then re-imported using an unauthenticated POST call to /99/Models.bin. During import, Keyed.readAll(ab) deserializes the attacker-controlled bytes, restoring the custom_metric_func reference without requiring authentication or any session token. [1]
Impact
When the imported model is subsequently used for scoring (prediction), the DkvClassLoader resolves the restored custom_metric_func, loads the attacker-controlled JAR from DKV, and instantiates the specified class. This enables arbitrary code execution on the H2O-3 server. The proof-of-concept shows that a malicious class can read server-side Java properties, such as sys.ai.h2o.audit.stage=2, confirming full remote code execution. An unauthenticated attacker can achieve a CVSS v3 score of 7.3 (High) by sending a single crafted request. [1]
Mitigation
The vendor (h2oai) was contacted but did not respond, and as of the publication date (May 2026) no patch has been released. Users must restrict network access to H2O-3 instances, disable the binary model import endpoint if possible, or apply strict network segmentation until an official fix is available. [1]
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- vuldb.com/submit/810107nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/364378nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/364378/ctinvdPermissions RequiredVDB Entry
- vulnplus-note.wetolink.com/share/b5nsQg6EcsBSnvdBroken Link
News mentions
0No linked articles in our index yet.