CVE-2025-46762
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
06/05/2025
Last modified:
02/09/2025
Description
Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code.<br />
<br />
While 1.15.1 introduced a fix to restrict untrusted packages, the default setting of trusted packages still allows malicious classes from these packages to be executed.<br />
<br />
The exploit is only applicable if the client code of parquet-avro uses the "specific" or the "reflect" models deliberately for reading Parquet files. ("generic" model is not impacted)<br />
<br />
Users are recommended to upgrade to 1.15.2 or set the system property "org.apache.parquet.avro.SERIALIZABLE_PACKAGES" to an empty string on 1.15.1. Both are sufficient to fix the issue.
Impact
Base Score 4.0
7.10
Severity 4.0
HIGH
Base Score 3.x
8.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:parquet:*:*:*:*:*:*:*:* | 1.15.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



