Cyber Posture

CVE-2025-9121

High

Published: 15 December 2025

Published
15 December 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the deserialization vulnerability by requiring timely application of the vendor patch to Pentaho version 10.2.0.4 or later.

prevent

Prevents exploitation of untrusted JSON deserialization by validating inputs and constraining the parser to approved classes and methods.

prevent

Enforces secure configuration settings for the Pentaho plugin to minimize unsafe deserialization risks through restrictive modes.

Security SummaryAI

CVE-2025-9121 is a deserialization of untrusted data vulnerability (CWE-502) affecting the Pentaho Data Integration and Analytics Community Dashboard Editor plugin in versions before 10.2.0.4, including the 9.3.0.x and 8.3.x series. The issue arises when the plugin deserializes untrusted JSON data without constraining the parser to approved classes and methods, enabling potential gadget chain exploitation. Published on 2025-12-15, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its network accessibility and comprehensive impact potential.

An authenticated attacker with low privileges (PR:L) can exploit this vulnerability remotely over the network (AV:N) with low complexity (AC:L) and without requiring user interaction (UI:N). Exploitation could grant high-level impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), likely allowing arbitrary code execution through malicious JSON payloads.

The Hitachi Vantara advisory at https://support.pentaho.com/hc/en-us/articles/41832536185613--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Deserialization-of-Untrusted-Data-Versions-before-10-2-0-4-Impacted-CVE-2025-9121 confirms the issue is resolved in version 10.2.0.4, recommending upgrades for all impacted Pentaho Business Analytics Server installations to mitigate the deserialization risk.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Deserialization of untrusted JSON in a public-facing Pentaho Business Analytics Server plugin enables remote code execution, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References