DataEase is an open source data visualization analysis tool. In versions 2.10.14 and below, the vendor added a blacklist to filter ldap:// and ldaps://. However, omission of protection for the dns:// protocol results in an SSRF vulnerability. This issue is fixed in version 2.10.15.
References
| Link | Resource |
|---|---|
| https://github.com/dataease/dataease/commit/869b7fb8b10069ac6c326554bfa8f060a539ba85 | Patch |
| https://github.com/dataease/dataease/releases/tag/v2.10.15 | Release Notes |
| https://github.com/dataease/dataease/security/advisories/GHSA-8397-v66p-539m | Exploit Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-11-06 00:15
Updated : 2025-11-07 18:06
NVD link : CVE-2025-64163
Mitre link : CVE-2025-64163
CVE.ORG link : CVE-2025-64163
JSON object : View
Products Affected
dataease
- dataease
CWE
CWE-918
Server-Side Request Forgery (SSRF)
