CVE-2025-46762

Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
06/05/2025
Last modified:
02/09/2025

Description

Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code.<br /> <br /> While 1.15.1 introduced a fix to restrict untrusted packages, the default setting of trusted packages still allows malicious classes from these packages to be executed.<br /> <br /> The exploit is only applicable if the client code of parquet-avro uses the "specific" or the "reflect" models deliberately for reading Parquet files. ("generic" model is not impacted)<br /> <br /> Users are recommended to upgrade to 1.15.2 or set the system property "org.apache.parquet.avro.SERIALIZABLE_PACKAGES" to an empty string on 1.15.1. Both are sufficient to fix the issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:apache:parquet:*:*:*:*:*:*:*:* 1.15.2 (excluding)