Vulnerability Details CVE-2025-48999
DataEase is an open source business intelligence and data visualization tool. A bypass of CVE-2025-46566's patch exists in versions prior to 2.10.10. In a malicious payload, `getUrlType()` retrieves `hostName`. Since the judgment statement returns false, it will not enter the if statement and will not be filtered. The payload can be directly concatenated at the replace location to construct a malicious JDBC statement. Version 2.10.10 contains a patch for the issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 15.7%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2025-48999
-
cpe:2.3:a:dataease:dataease:-
-
cpe:2.3:a:dataease:dataease:1.0.0
-
cpe:2.3:a:dataease:dataease:1.0.1
-
cpe:2.3:a:dataease:dataease:1.0.2
-
cpe:2.3:a:dataease:dataease:1.1.0
-
cpe:2.3:a:dataease:dataease:1.1.1
-
cpe:2.3:a:dataease:dataease:1.10.0
-
cpe:2.3:a:dataease:dataease:1.11.0
-
cpe:2.3:a:dataease:dataease:1.11.1
-
cpe:2.3:a:dataease:dataease:1.11.2
-
cpe:2.3:a:dataease:dataease:1.11.3
-
cpe:2.3:a:dataease:dataease:1.12.0
-
cpe:2.3:a:dataease:dataease:1.13.0
-
cpe:2.3:a:dataease:dataease:1.13.1
-
cpe:2.3:a:dataease:dataease:1.14.0
-
cpe:2.3:a:dataease:dataease:1.15.0
-
cpe:2.3:a:dataease:dataease:1.15.1
-
cpe:2.3:a:dataease:dataease:1.15.2
-
cpe:2.3:a:dataease:dataease:1.15.3
-
cpe:2.3:a:dataease:dataease:1.15.4
-
cpe:2.3:a:dataease:dataease:1.16.0
-
cpe:2.3:a:dataease:dataease:1.16.1
-
cpe:2.3:a:dataease:dataease:1.17.0
-
cpe:2.3:a:dataease:dataease:1.17.1
-
cpe:2.3:a:dataease:dataease:1.18.0
-
cpe:2.3:a:dataease:dataease:1.18.1
-
cpe:2.3:a:dataease:dataease:1.18.10
-
cpe:2.3:a:dataease:dataease:1.18.11
-
cpe:2.3:a:dataease:dataease:1.18.12
-
cpe:2.3:a:dataease:dataease:1.18.13
-
cpe:2.3:a:dataease:dataease:1.18.14
-
cpe:2.3:a:dataease:dataease:1.18.15
-
cpe:2.3:a:dataease:dataease:1.18.16
-
cpe:2.3:a:dataease:dataease:1.18.17
-
cpe:2.3:a:dataease:dataease:1.18.18
-
cpe:2.3:a:dataease:dataease:1.18.19
-
cpe:2.3:a:dataease:dataease:1.18.2
-
cpe:2.3:a:dataease:dataease:1.18.20
-
cpe:2.3:a:dataease:dataease:1.18.21
-
cpe:2.3:a:dataease:dataease:1.18.22
-
cpe:2.3:a:dataease:dataease:1.18.23
-
cpe:2.3:a:dataease:dataease:1.18.24
-
cpe:2.3:a:dataease:dataease:1.18.25
-
cpe:2.3:a:dataease:dataease:1.18.26
-
cpe:2.3:a:dataease:dataease:1.18.27
-
cpe:2.3:a:dataease:dataease:1.18.3
-
cpe:2.3:a:dataease:dataease:1.18.4
-
cpe:2.3:a:dataease:dataease:1.18.5
-
cpe:2.3:a:dataease:dataease:1.18.6
-
cpe:2.3:a:dataease:dataease:1.18.7
-
cpe:2.3:a:dataease:dataease:1.18.8
-
cpe:2.3:a:dataease:dataease:1.18.9
-
cpe:2.3:a:dataease:dataease:1.2.0
-
cpe:2.3:a:dataease:dataease:1.2.1
-
cpe:2.3:a:dataease:dataease:1.2.2
-
cpe:2.3:a:dataease:dataease:1.2.3
-
cpe:2.3:a:dataease:dataease:1.3.0
-
cpe:2.3:a:dataease:dataease:1.4.0
-
cpe:2.3:a:dataease:dataease:1.4.1
-
cpe:2.3:a:dataease:dataease:1.5.0
-
cpe:2.3:a:dataease:dataease:1.5.1
-
cpe:2.3:a:dataease:dataease:1.5.2
-
cpe:2.3:a:dataease:dataease:1.6.0
-
cpe:2.3:a:dataease:dataease:1.6.1
-
cpe:2.3:a:dataease:dataease:1.6.2
-
cpe:2.3:a:dataease:dataease:1.7.0
-
cpe:2.3:a:dataease:dataease:1.8.0
-
cpe:2.3:a:dataease:dataease:1.9.0
-
cpe:2.3:a:dataease:dataease:1.9.1
-
cpe:2.3:a:dataease:dataease:2.0.0
-
cpe:2.3:a:dataease:dataease:2.1.0
-
cpe:2.3:a:dataease:dataease:2.10.0
-
cpe:2.3:a:dataease:dataease:2.10.1
-
cpe:2.3:a:dataease:dataease:2.10.2
-
cpe:2.3:a:dataease:dataease:2.10.3
-
cpe:2.3:a:dataease:dataease:2.10.4
-
cpe:2.3:a:dataease:dataease:2.10.6
-
cpe:2.3:a:dataease:dataease:2.10.8
-
cpe:2.3:a:dataease:dataease:2.10.9
-
cpe:2.3:a:dataease:dataease:2.2.0
-
cpe:2.3:a:dataease:dataease:2.3.0
-
cpe:2.3:a:dataease:dataease:2.4.0
-
cpe:2.3:a:dataease:dataease:2.4.1
-
cpe:2.3:a:dataease:dataease:2.5.0
-
cpe:2.3:a:dataease:dataease:2.6.0
-
cpe:2.3:a:dataease:dataease:2.6.1
-
cpe:2.3:a:dataease:dataease:2.7.0
-
cpe:2.3:a:dataease:dataease:2.7.1
-
cpe:2.3:a:dataease:dataease:2.8.0
-
cpe:2.3:a:dataease:dataease:2.8.1
-
cpe:2.3:a:dataease:dataease:2.9.0