Cyber Posture

CVE-2025-64164

CriticalPublic PoC

Published: 06 November 2025

Published
06 November 2025
Modified
07 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0015 34.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-64164 is a Java Naming and Directory Interface (JNDI) injection vulnerability in DataEase, an open source data visualization analysis tool. The flaw affects versions 2.10.14 and below, stemming from improper input filtering when establishing JDBC connections to Oracle databases. Published on 2025-11-06, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-502.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and no user interaction. By supplying malicious input during the JDBC connection process to Oracle, they can trigger JNDI injection, enabling high-impact compromise of confidentiality, integrity, and availability on the affected DataEase instance.

The vulnerability is fixed in DataEase version 2.10.15. Mitigation involves upgrading to this patched release. Key resources include the fixing commit at https://github.com/dataease/dataease/commit/7b68eb3dfccbbd12ec977e6320dbd3e32a7bbfe6, the v2.10.15 release notes at https://github.com/dataease/dataease/releases/tag/v2.10.15, and the GitHub security advisory at https://github.com/dataease/dataease/security/advisories/GHSA-q754-4pc2-wjqw.

Details

CWE(s)
CWE-502

Affected Products

dataease
dataease
≤ 2.10.15

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

JNDI injection vulnerability in DataEase JDBC Oracle connection handling enables remote code execution by exploiting the public-facing web application when processing malicious JDBC URLs pointing to attacker-controlled LDAP servers.

References