DEV Community

Sharon
Sharon

Posted on • Edited on

Critical RCE Vulnerabilities Found in DataEase (CVE-2025-49001/49002)

About Author

Hi, I'm Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for real-world threats. While SafeLine focuses on HTTP-layer protection, our emergency response center monitors and responds to RCE and authentication vulnerabilities across the stack to help developers stay safe.


DataEase, an open-source data visualization platform, has recently been found vulnerable to a series of high-risk flaws that allow unauthenticated Remote Code Execution (RCE) and authentication bypass. These vulnerabilities — now publicly disclosed — pose a serious risk to internet-facing deployments.


Vulnerability Overview

In June 2025, multiple security advisories were published disclosing the following CVEs:

  • CVE-2025-48999
  • CVE-2025-49002
  • CVE-2025-49001

When chained together, these flaws enable attackers to bypass authentication and remotely execute arbitrary Java code on the server, potentially compromising the entire host.


Root Cause

CVE-2025-48999

Improper input validation when configuring Redshift as a data source allows authenticated users to inject malicious JDBC parameters. These are processed without adequate sanitization, leading to code execution on the server.

CVE-2025-49002

A similar flaw exists when configuring H2 databases. Attackers can exploit JDBC parameters like INIT= to trigger code execution via specially crafted connection strings.

CVE-2025-49001

A logic flaw in DataEase’s JWT authentication system causes the backend to continue processing invalid tokens instead of rejecting them. This enables attackers to forge tokens and gain unauthorized access — a stepping stone for RCE.


Impact

Risk Type Details
Remote Code Execution Arbitrary Java code execution via malicious JDBC payloads
Authentication Bypass Unauthorized access through forged JWT tokens
Affected Component DataEase backend (JDBC + JWT auth modules)
Exploit Prerequisites None — attacks work without valid credentials
System Requirements Default configurations are vulnerable
Exploit Maturity Public PoC/EXP available
Severity High
Fix Complexity Low — official patch released

Affected Versions

DataEase < 2.10.10
Enter fullscreen mode Exit fullscreen mode

🛠 Recommended Mitigation

Temporary Workarounds

  • Use WAF/Firewall: Block malicious JDBC payload patterns.
  • Restrict Outbound Access: Prevent the server from connecting to external resources via JDBC.
  • Avoid Public Exposure: Do not expose DataEase to the public internet if unnecessary.

Permanent Fix

Upgrade to the latest version:

➡️ DataEase v2.10.10 Release


Reproduction

Screenshots demonstrate the successful remote code execution via malicious JDBC injection:

Image description

Image description

Image description


Product Detection Support

Product Detection Status
Yuntu Fingerprinting & PoC-based detection supported by default
Dongjian Custom PoC detection supported
SafeLine Custom WAF rules released to detect this attack
Quanxi Detection rule updates published

Timeline

  • Jun 5, 2025 – Public advisory released by Chaitin Security Emergency Response Center

References


Join the SafeLine Community

Top comments (0)

Some comments may only be visible to logged-in visitors. Sign in to view all comments.