CVE-2025-6544
⛔ criticalSummary
A deserialization vulnerability exists in h2oai/h2o-3 versions <= 3.46.0.8, allowing attackers to read arbitrary system files and execute arbitrary code. The vulnerability arises from improper handling of JDBC connection parameters, which can be exploited by bypassing regular expression checks and using double URL encoding. This issue impacts all users of the affected versions.
CVSS Score
9.8
Critical
EPSS Score
0.3
Exploit Probability
Published Date
2025-09-21
First Seen: 2026-01-05
📊 Relative Risk Intelligence
This CVE is Very High Risk - more severe than 90.4% of all 321,566 vulnerabilities in our database.
#30,777
Top 10% most severe
Severity Percentile
🎯 CISA SSVC Assessment Updated: Sep 22, 2025
🔍 Exploitation Status
Poc
Proof-of-concept available
⚙️ Automatable
YES
Can be exploited automatically
💥 Technical Impact
Total
Complete system compromise possible
SSVC data provided by
CISA
Last Modified
2025-10-08
Source
NVD 🔗
CVSS Vector 3.1
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE IDs (Weakness Types)