0.0
NA
CVE-2025-30065
Apache Parquet Remote Code Execution Vulnerability
Description

Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code Users are recommended to upgrade to version 1.15.1, which fixes the issue.

INFO

Published Date :

April 1, 2025, 8:15 a.m.

Last Modified :

April 7, 2025, 3:15 a.m.

Remotely Exploitable :

No

Impact Score :

Exploitability Score :

Public PoC/Exploit Available at Github

CVE-2025-30065 has a 6 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2025-30065 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

No affected product recoded yet

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

A CVSS 10.0-rated vulnerability in the parquet-avro Java module allows remote code execution via unsafe deserialization when parsing schemas. Tracked as CVE-2025-30065, this flaw affects Apache Parquet ≤ 1.15.0. All users must upgrade to version 1.15.1 immediately to mitigate exploitation risks.

Python JavaScript CSS HTML

Updated: 3 days, 5 hours ago
0 stars 0 fork 0 watcher
Born at : April 21, 2025, 3:28 p.m. This repo has been linked 1 different CVEs too.

None

HTML Java

Updated: 2 weeks, 3 days ago
0 stars 0 fork 0 watcher
Born at : April 7, 2025, 9:38 p.m. This repo has been linked 1 different CVEs too.

CVE-2025-30065 PoC

Dockerfile Shell Java

Updated: 2 weeks, 5 days ago
0 stars 0 fork 0 watcher
Born at : April 5, 2025, 9:43 a.m. This repo has been linked 1 different CVEs too.

PoC

Java

Updated: 2 days, 21 hours ago
11 stars 3 fork 3 watcher
Born at : April 4, 2025, 10:37 a.m. This repo has been linked 1 different CVEs too.

​After reviewing the provided Proof of Concept (PoC) for CVE-2025-30065, it appears that the vulnerability exploits the deserialization mechanism in Apache Parquet's handling of Avro schemas, particularly through the use of the default property to instantiate arbitrary classes.

Java

Updated: 6 days, 14 hours ago
3 stars 1 fork 1 watcher
Born at : April 4, 2025, 8:45 a.m. This repo has been linked 1 different CVEs too.

📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.

security cve exploit poc vulnerability

Updated: 2 hours, 49 minutes ago
6865 stars 1157 fork 1157 watcher
Born at : Dec. 8, 2019, 1:03 p.m. This repo has been linked 850 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-30065 vulnerability anywhere in the article.

  • The Hacker News
Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence

Vulnerability / Software Security A critical security vulnerability has been disclosed in the Apache Roller open-source, Java-based blogging server software that could allow malicious actors to retain ... Read more

Published Date: Apr 15, 2025 (1 week, 2 days ago)
  • Daily CyberSecurity
Major Cybersecurity Events (31st March – 6th April 2025)

In the past week, several significant cybersecurity incidents have made headlines – including high-impact data breaches, and newly discovered or exploited vulnerabilities. Below is a structured summar ... Read more

Published Date: Apr 07, 2025 (2 weeks, 4 days ago)
  • The Register
Signalgate solved? Report claims journalist’s phone number accidentally saved under name of Trump official

Infosec in Brief How did journalist Jeffrey Goldberg’s phone number end up in a Signal group chat? According to The Guardian, US national security adviser Mike Waltz accidentally saved it into the con ... Read more

Published Date: Apr 07, 2025 (2 weeks, 4 days ago)
  • TheCyberThrone
TheCyberThrone CyberSecurity Newsletter Top 5 Articles – March 2025

Welcome to TheCyberThrone cybersecurity month in review will be posted covering the important security happenings . This review is for the month ending March 2025Subscribers favorite #1CVE-2025-0411 i ... Read more

Published Date: Apr 06, 2025 (2 weeks, 5 days ago)
  • security.nl
Kritiek Apache Parquet-lek maakt remote code execution mogelijk

Een kritieke kwetsbaarheid in de Apache Parquet Java-library maakt het mogelijk voor een aanvallers om op afstand willekeurige code op systemen uit te voeren. De impact van het beveiligingslek is op e ... Read more

Published Date: Apr 04, 2025 (2 weeks, 6 days ago)
  • Cyber Security News
Critical Apache Parquet RCE Vulnerability Lets Attackers Run Malicious Code

A critical remote code execution (RCE) vulnerability has been discovered in Apache Parquet’s Java library, potentially affecting thousands of data analytics systems worldwide. The flaw, identified as ... Read more

Published Date: Apr 04, 2025 (2 weeks, 6 days ago)
  • The Hacker News
Critical Flaw in Apache Parquet Allows Remote Attackers to Execute Arbitrary Code

Vulnerability / Cloud Security A maximum severity security vulnerability has been disclosed in Apache Parquet's Java Library that, if successfully exploited, could allow a remote attacker to execute a ... Read more

Published Date: Apr 04, 2025 (3 weeks ago)
  • BleepingComputer
Max severity RCE flaw discovered in widely used Apache Parquet

A maximum severity remote code execution (RCE) vulnerability has been discovered impacting all versions of Apache Parquet up to and including 1.15.0. The problem stems from the deserialization of untr ... Read more

Published Date: Apr 03, 2025 (3 weeks ago)
  • Daily CyberSecurity
CVE-2025-30065 (CVSS 10): Critical Vulnerability Discovered in Apache Parquet Java

Apache Parquet, a widely used open-source, column-oriented data file format, has been found to contain a critical security vulnerability. This vulnerability poses a significant risk to systems utilizi ... Read more

Published Date: Apr 02, 2025 (3 weeks, 2 days ago)

The following table lists the changes that have been made to the CVE-2025-30065 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 07, 2025

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/security/cve/CVE-2025-30065
    Added Reference https://github.com/apache/parquet-java/pull/3169
    Added Reference https://news.ycombinator.com/item?id=43603091
    Added Reference https://www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Apr. 02, 2025

    Action Type Old Value New Value
    Added Reference http://www.openwall.com/lists/oss-security/2025/04/01/1
  • New CVE Received by [email protected]

    Apr. 01, 2025

    Action Type Old Value New Value
    Added Description Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code Users are recommended to upgrade to version 1.15.1, which fixes the issue.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-502
    Added Reference https://lists.apache.org/thread/okzqb3kn479gqzxm21gg5vqr35om9gw5
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-30065 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-30065 weaknesses.

NONE - Vulnerability Scoring System
© cvefeed.io
Latest DB Update: Apr. 25, 2025 9:24