#VU126345 Improper input validation in DataEase - CVE-2025-62419
Published: April 16, 2026
DataEase
DataEase
Description
The vulnerability allows a remote user to trigger outbound requests to an attacker-controlled server.
The vulnerability exists due to improper input validation in the db2 and Mongo data source JDBC URL construction logic when processing user-supplied connection parameters. A remote user can supply a malicious JDBC string in the hostname field to trigger outbound requests to an attacker-controlled server.
The issue is triggered when the Get Schema function processes a data source configuration with empty extraParams.