Vulnerability Details CVE-2025-49003
DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.11, a threat actor may take advantage of a feature in Java in which the character "ı" becomes "I" when converted to uppercase, and the character "ſ" becomes "S" when converted to uppercase. A threat actor who uses a carefully crafted message that exploits this character conversion can cause remote code execution. The vulnerability has been fixed in v2.10.11. No known workarounds are available.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 44.8%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2025-49003
-
cpe:2.3:a:dataease:dataease:-
-
cpe:2.3:a:dataease:dataease:1.0.0
-
cpe:2.3:a:dataease:dataease:1.0.1
-
cpe:2.3:a:dataease:dataease:1.0.2
-
cpe:2.3:a:dataease:dataease:1.1.0
-
cpe:2.3:a:dataease:dataease:1.1.1
-
cpe:2.3:a:dataease:dataease:1.10.0
-
cpe:2.3:a:dataease:dataease:1.11.0
-
cpe:2.3:a:dataease:dataease:1.11.1
-
cpe:2.3:a:dataease:dataease:1.11.2
-
cpe:2.3:a:dataease:dataease:1.11.3
-
cpe:2.3:a:dataease:dataease:1.12.0
-
cpe:2.3:a:dataease:dataease:1.13.0
-
cpe:2.3:a:dataease:dataease:1.13.1
-
cpe:2.3:a:dataease:dataease:1.14.0
-
cpe:2.3:a:dataease:dataease:1.15.0
-
cpe:2.3:a:dataease:dataease:1.15.1
-
cpe:2.3:a:dataease:dataease:1.15.2
-
cpe:2.3:a:dataease:dataease:1.15.3
-
cpe:2.3:a:dataease:dataease:1.15.4
-
cpe:2.3:a:dataease:dataease:1.16.0
-
cpe:2.3:a:dataease:dataease:1.16.1
-
cpe:2.3:a:dataease:dataease:1.17.0
-
cpe:2.3:a:dataease:dataease:1.17.1
-
cpe:2.3:a:dataease:dataease:1.18.0
-
cpe:2.3:a:dataease:dataease:1.18.1
-
cpe:2.3:a:dataease:dataease:1.18.10
-
cpe:2.3:a:dataease:dataease:1.18.11
-
cpe:2.3:a:dataease:dataease:1.18.12
-
cpe:2.3:a:dataease:dataease:1.18.13
-
cpe:2.3:a:dataease:dataease:1.18.14
-
cpe:2.3:a:dataease:dataease:1.18.15
-
cpe:2.3:a:dataease:dataease:1.18.16
-
cpe:2.3:a:dataease:dataease:1.18.17
-
cpe:2.3:a:dataease:dataease:1.18.18
-
cpe:2.3:a:dataease:dataease:1.18.19
-
cpe:2.3:a:dataease:dataease:1.18.2
-
cpe:2.3:a:dataease:dataease:1.18.20
-
cpe:2.3:a:dataease:dataease:1.18.21
-
cpe:2.3:a:dataease:dataease:1.18.22
-
cpe:2.3:a:dataease:dataease:1.18.23
-
cpe:2.3:a:dataease:dataease:1.18.24
-
cpe:2.3:a:dataease:dataease:1.18.25
-
cpe:2.3:a:dataease:dataease:1.18.26
-
cpe:2.3:a:dataease:dataease:1.18.27
-
cpe:2.3:a:dataease:dataease:1.18.3
-
cpe:2.3:a:dataease:dataease:1.18.4
-
cpe:2.3:a:dataease:dataease:1.18.5
-
cpe:2.3:a:dataease:dataease:1.18.6
-
cpe:2.3:a:dataease:dataease:1.18.7
-
cpe:2.3:a:dataease:dataease:1.18.8
-
cpe:2.3:a:dataease:dataease:1.18.9
-
cpe:2.3:a:dataease:dataease:1.2.0
-
cpe:2.3:a:dataease:dataease:1.2.1
-
cpe:2.3:a:dataease:dataease:1.2.2
-
cpe:2.3:a:dataease:dataease:1.2.3
-
cpe:2.3:a:dataease:dataease:1.3.0
-
cpe:2.3:a:dataease:dataease:1.4.0
-
cpe:2.3:a:dataease:dataease:1.4.1
-
cpe:2.3:a:dataease:dataease:1.5.0
-
cpe:2.3:a:dataease:dataease:1.5.1
-
cpe:2.3:a:dataease:dataease:1.5.2
-
cpe:2.3:a:dataease:dataease:1.6.0
-
cpe:2.3:a:dataease:dataease:1.6.1
-
cpe:2.3:a:dataease:dataease:1.6.2
-
cpe:2.3:a:dataease:dataease:1.7.0
-
cpe:2.3:a:dataease:dataease:1.8.0
-
cpe:2.3:a:dataease:dataease:1.9.0
-
cpe:2.3:a:dataease:dataease:1.9.1
-
cpe:2.3:a:dataease:dataease:2.0.0
-
cpe:2.3:a:dataease:dataease:2.1.0
-
cpe:2.3:a:dataease:dataease:2.10.0
-
cpe:2.3:a:dataease:dataease:2.10.1
-
cpe:2.3:a:dataease:dataease:2.10.2
-
cpe:2.3:a:dataease:dataease:2.10.3
-
cpe:2.3:a:dataease:dataease:2.10.4
-
cpe:2.3:a:dataease:dataease:2.10.6
-
cpe:2.3:a:dataease:dataease:2.2.0
-
cpe:2.3:a:dataease:dataease:2.3.0
-
cpe:2.3:a:dataease:dataease:2.4.0
-
cpe:2.3:a:dataease:dataease:2.4.1
-
cpe:2.3:a:dataease:dataease:2.5.0
-
cpe:2.3:a:dataease:dataease:2.6.0
-
cpe:2.3:a:dataease:dataease:2.6.1
-
cpe:2.3:a:dataease:dataease:2.7.0
-
cpe:2.3:a:dataease:dataease:2.7.1
-
cpe:2.3:a:dataease:dataease:2.8.0
-
cpe:2.3:a:dataease:dataease:2.8.1
-
cpe:2.3:a:dataease:dataease:2.9.0