CVE-2025-66913
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
JimuReport thru version 2.1.3 is vulnerable to remote code execution when processing user-controlled H2 JDBC URLs. The application passes the attacker-supplied JDBC URL directly to the H2 driver, allowing the use of certain directives to execute arbitrary Java code. A different vulnerability than CVE-2025-10770.
Analysis
JimuReport through 2.1.3 has RCE via user-controlled H2 JDBC URLs. The application passes attacker-supplied JDBC connection strings directly to the H2 driver, which supports directives for arbitrary Java code execution. PoC available.
Technical Context
User-controlled JDBC URLs are passed to the H2 database driver without sanitization (CWE-94). H2 supports INIT=RUNSCRIPT and other directives that execute arbitrary Java code during connection initialization. This is a well-known attack vector against H2-based applications.
Affected Products
JimuReport through 2.1.3
Remediation
Update JimuReport. Validate and whitelist JDBC connection URLs. Use a dedicated database account with minimal privileges.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today