H2O affected by a deserialization vulnerability
Critical severity
GitHub Reviewed
Published
Sep 22, 2025
to the GitHub Advisory Database
•
Updated Sep 22, 2025
Description
Published by the National Vulnerability Database
Sep 21, 2025
Published to the GitHub Advisory Database
Sep 22, 2025
Last updated
Sep 22, 2025
Reviewed
Sep 22, 2025
A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.7, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
References