A deserialization vulnerability exists in the H2O-3 REST API (POST /99/ImportSQLTable) that affects all versions up to 3.46.0.7. This vulnerability allows remote code execution (RCE) due to improper validation of JDBC connection parameters when using a Key-Value format. The vulnerability is present in the MySQL JDBC Driver version 8.0.19 and JDK version 8u112. The issue is resolved in version 3.46.0.8.
[
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"250191715821090918306241566954362276992",
"248411234240197241866355280427735067319",
"291238776749201798456065015129166997439",
"291855060806572723460322603111873033611"
]
},
"signature_version": "v1",
"id": "CVE-2025-5662-740dad75",
"source": "https://github.com/h2oai/h2o-3/commit/f714edd6b8429c7a7211b779b6ec108a95b7382d",
"target": {
"file": "h2o-core/src/main/java/water/jdbc/SQLManager.java"
}
},
{
"deprecated": false,
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"256970584341447576029732332666937135395",
"1813124273649513015692804565518622333"
]
},
"signature_version": "v1",
"id": "CVE-2025-5662-76628956",
"source": "https://github.com/h2oai/h2o-3/commit/f714edd6b8429c7a7211b779b6ec108a95b7382d",
"target": {
"file": "h2o-core/src/test/java/water/jdbc/SQLManagerTest.java"
}
}
]