CWE-153

Improper Neutralization of Substitution Characters

4 CVEs Avg CVSS 9.8 MITRE
4
CRITICAL
0
HIGH
0
MEDIUM
0
LOW
4
POC
0
KEV

Monthly

CVE-2025-53006 CRITICAL POC Act Now

A remote code execution vulnerability in DataEase (CVSS 9.8). Risk factors: public PoC available.

Information Disclosure PostgreSQL Dataease
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-53005 CRITICAL POC Act Now

A remote code execution vulnerability in DataEase (CVSS 9.8). Risk factors: public PoC available.

Authentication Bypass PostgreSQL Dataease
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-53004 CRITICAL POC PATCH Act Now

A remote code execution vulnerability in DataEase (CVSS 9.8). Risk factors: public PoC available.

Authentication Bypass Dataease
NVD GitHub
CVSS 3.1
9.8
EPSS
0.1%
CVE-2025-49003 CRITICAL POC Act Now

DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.11, a threat actor may take advantage of a feature in Java in which the character "ı" becomes "I" when converted to uppercase, and the character "ſ" becomes "S" when converted to uppercase. A threat actor who uses a carefully crafted message that exploits this character conversion can cause remote code execution. The vulnerability has been fixed in v2.10.11. No known workarounds are available.

RCE Java Dataease
NVD GitHub
CVSS 3.1
9.8
EPSS
0.8%
CVE-2025-53006
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

A remote code execution vulnerability in DataEase (CVSS 9.8). Risk factors: public PoC available.

Information Disclosure PostgreSQL Dataease
NVD GitHub
CVE-2025-53005
EPSS 0% CVSS 9.8
CRITICAL POC Act Now

A remote code execution vulnerability in DataEase (CVSS 9.8). Risk factors: public PoC available.

Authentication Bypass PostgreSQL Dataease
NVD GitHub
CVE-2025-53004
EPSS 0% CVSS 9.8
CRITICAL POC PATCH Act Now

A remote code execution vulnerability in DataEase (CVSS 9.8). Risk factors: public PoC available.

Authentication Bypass Dataease
NVD GitHub
CVE-2025-49003
EPSS 1% CVSS 9.8
CRITICAL POC Act Now

DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.11, a threat actor may take advantage of a feature in Java in which the character "ı" becomes "I" when converted to uppercase, and the character "ſ" becomes "S" when converted to uppercase. A threat actor who uses a carefully crafted message that exploits this character conversion can cause remote code execution. The vulnerability has been fixed in v2.10.11. No known workarounds are available.

RCE Java Dataease
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy