Vulnerability Details CVE-2025-48998
DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.6, a bypass of the patch for CVE-2025-27103 allows authenticated users to read and deserialize arbitrary files through the background JDBC connection. The vulnerability has been fixed in v2.10.10. No known workarounds are available.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 18.3%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2025-48998
-
cpe:2.3:a:dataease:dataease:-
-
cpe:2.3:a:dataease:dataease:1.0.0
-
cpe:2.3:a:dataease:dataease:1.0.1
-
cpe:2.3:a:dataease:dataease:1.0.2
-
cpe:2.3:a:dataease:dataease:1.1.0
-
cpe:2.3:a:dataease:dataease:1.1.1
-
cpe:2.3:a:dataease:dataease:1.10.0
-
cpe:2.3:a:dataease:dataease:1.11.0
-
cpe:2.3:a:dataease:dataease:1.11.1
-
cpe:2.3:a:dataease:dataease:1.11.2
-
cpe:2.3:a:dataease:dataease:1.11.3
-
cpe:2.3:a:dataease:dataease:1.12.0
-
cpe:2.3:a:dataease:dataease:1.13.0
-
cpe:2.3:a:dataease:dataease:1.13.1
-
cpe:2.3:a:dataease:dataease:1.14.0
-
cpe:2.3:a:dataease:dataease:1.15.0
-
cpe:2.3:a:dataease:dataease:1.15.1
-
cpe:2.3:a:dataease:dataease:1.15.2
-
cpe:2.3:a:dataease:dataease:1.15.3
-
cpe:2.3:a:dataease:dataease:1.15.4
-
cpe:2.3:a:dataease:dataease:1.16.0
-
cpe:2.3:a:dataease:dataease:1.16.1
-
cpe:2.3:a:dataease:dataease:1.17.0
-
cpe:2.3:a:dataease:dataease:1.17.1
-
cpe:2.3:a:dataease:dataease:1.18.0
-
cpe:2.3:a:dataease:dataease:1.18.1
-
cpe:2.3:a:dataease:dataease:1.18.10
-
cpe:2.3:a:dataease:dataease:1.18.11
-
cpe:2.3:a:dataease:dataease:1.18.12
-
cpe:2.3:a:dataease:dataease:1.18.13
-
cpe:2.3:a:dataease:dataease:1.18.14
-
cpe:2.3:a:dataease:dataease:1.18.15
-
cpe:2.3:a:dataease:dataease:1.18.16
-
cpe:2.3:a:dataease:dataease:1.18.17
-
cpe:2.3:a:dataease:dataease:1.18.18
-
cpe:2.3:a:dataease:dataease:1.18.19
-
cpe:2.3:a:dataease:dataease:1.18.2
-
cpe:2.3:a:dataease:dataease:1.18.20
-
cpe:2.3:a:dataease:dataease:1.18.21
-
cpe:2.3:a:dataease:dataease:1.18.22
-
cpe:2.3:a:dataease:dataease:1.18.23
-
cpe:2.3:a:dataease:dataease:1.18.24
-
cpe:2.3:a:dataease:dataease:1.18.25
-
cpe:2.3:a:dataease:dataease:1.18.26
-
cpe:2.3:a:dataease:dataease:1.18.27
-
cpe:2.3:a:dataease:dataease:1.18.3
-
cpe:2.3:a:dataease:dataease:1.18.4
-
cpe:2.3:a:dataease:dataease:1.18.5
-
cpe:2.3:a:dataease:dataease:1.18.6
-
cpe:2.3:a:dataease:dataease:1.18.7
-
cpe:2.3:a:dataease:dataease:1.18.8
-
cpe:2.3:a:dataease:dataease:1.18.9
-
cpe:2.3:a:dataease:dataease:1.2.0
-
cpe:2.3:a:dataease:dataease:1.2.1
-
cpe:2.3:a:dataease:dataease:1.2.2
-
cpe:2.3:a:dataease:dataease:1.2.3
-
cpe:2.3:a:dataease:dataease:1.3.0
-
cpe:2.3:a:dataease:dataease:1.4.0
-
cpe:2.3:a:dataease:dataease:1.4.1
-
cpe:2.3:a:dataease:dataease:1.5.0
-
cpe:2.3:a:dataease:dataease:1.5.1
-
cpe:2.3:a:dataease:dataease:1.5.2
-
cpe:2.3:a:dataease:dataease:1.6.0
-
cpe:2.3:a:dataease:dataease:1.6.1
-
cpe:2.3:a:dataease:dataease:1.6.2
-
cpe:2.3:a:dataease:dataease:1.7.0
-
cpe:2.3:a:dataease:dataease:1.8.0
-
cpe:2.3:a:dataease:dataease:1.9.0
-
cpe:2.3:a:dataease:dataease:1.9.1
-
cpe:2.3:a:dataease:dataease:2.0.0
-
cpe:2.3:a:dataease:dataease:2.1.0
-
cpe:2.3:a:dataease:dataease:2.10.0
-
cpe:2.3:a:dataease:dataease:2.10.1
-
cpe:2.3:a:dataease:dataease:2.10.2
-
cpe:2.3:a:dataease:dataease:2.10.3
-
cpe:2.3:a:dataease:dataease:2.10.4
-
cpe:2.3:a:dataease:dataease:2.2.0
-
cpe:2.3:a:dataease:dataease:2.3.0
-
cpe:2.3:a:dataease:dataease:2.4.0
-
cpe:2.3:a:dataease:dataease:2.4.1
-
cpe:2.3:a:dataease:dataease:2.5.0
-
cpe:2.3:a:dataease:dataease:2.6.0
-
cpe:2.3:a:dataease:dataease:2.6.1
-
cpe:2.3:a:dataease:dataease:2.7.0
-
cpe:2.3:a:dataease:dataease:2.7.1
-
cpe:2.3:a:dataease:dataease:2.8.0
-
cpe:2.3:a:dataease:dataease:2.8.1
-
cpe:2.3:a:dataease:dataease:2.9.0