H2O-3 is Vulnerable to Code Injection
Moderate severity
GitHub Reviewed
Published
Apr 23, 2026
to the GitHub Advisory Database
•
Updated May 4, 2026
Description
Published by the National Vulnerability Database
Apr 23, 2026
Published to the GitHub Advisory Database
Apr 23, 2026
Reviewed
May 4, 2026
Last updated
May 4, 2026
A critical remote code execution vulnerability exists in the unauthenticated REST API endpoint /99/ImportSQLTable in H2O-3 version 3.46.0.9 and prior. The vulnerability arises due to insufficient security controls in the parameter blacklist mechanism, which only targets MySQL JDBC driver-specific dangerous parameters. An attacker can bypass these controls by switching the JDBC URL protocol to jdbc:postgresql: and exploiting PostgreSQL JDBC driver-specific parameters such as socketFactory and socketFactoryArg. This allows unauthenticated attackers to execute arbitrary code on the H2O-3 server with the privileges of the H2O-3 process. The issue is resolved in version 3.46.0.10.
References