CVE-2025-46762 – org.apache.parquet:parquet-avro
Package
Manager: maven
Name: org.apache.parquet:parquet-avro
Vulnerable Version: >=0 <1.15.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/S:N/RE:M/U:Amber
EPSS: 0.00129 pctl0.33091
Details
Apache Parquet Java: Potential malicious code execution from trusted packages in the parquet-avro module when reading an Avro schema from a Parquet file metadata Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code. While 1.15.1 introduced a fix to restrict untrusted packages, the default setting of trusted packages still allows malicious classes from these packages to be executed. The exploit is only applicable if the client code of parquet-avro uses the "specific" or the "reflect" models deliberately for reading Parquet files. ("generic" model is not impacted) Users are recommended to upgrade to 1.15.2 or set the system property "org.apache.parquet.avro.SERIALIZABLE_PACKAGES" to an empty string on 1.15.1. Both are sufficient to fix the issue.
Metadata
Created: 2025-05-06T12:30:23Z
Modified: 2025-05-06T16:46:15Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/05/GHSA-53wx-pr6q-m3j5/GHSA-53wx-pr6q-m3j5.json
CWE IDs: ["CWE-73"]
Alternative ID: GHSA-53wx-pr6q-m3j5
Finding: F063
Auto approve: 1