CVE-2025-46762 – Apache Parquet Parquet-avro Remote Code Execution Vulnerability

The following table lists the changes that have been made to the
CVE-2025-46762 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    May. 06, 2025

    Action Type Old Value New Value
    Added Description Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code.

    While 1.15.1 introduced a fix to restrict untrusted packages, the default setting of trusted packages still allows malicious classes from these packages to be executed.

    The exploit is only applicable if the client code of parquet-avro uses the “specific” or the “reflect” models deliberately for reading Parquet files. (“generic” model is not impacted)

    Users are recommended to upgrade to 1.15.2 or set the system property “org.apache.parquet.avro.SERIALIZABLE_PACKAGES” to an empty string on 1.15.1. Both are sufficient to fix the issue.

    Added CVSS V4.0 AV:N/AC:L/AT:P/PR:H/UI:A/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:X/R:X/V:X/RE:M/U:Amber
    Added CWE CWE-73
    Added Reference https://lists.apache.org/thread/t7724lpvl110xsbgqwsmrdsns0rhycdp
  • CVE Modified
    by af854a3a-2127-422b-91ae-364da2661108

    May. 06, 2025

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2025/05/02/1
Share the Post:

Related Posts