Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.parquet/parquet-avro
  4. ›
  5. CVE-2025-30065

CVE-2025-30065: Apache Parquet Avro Module Vulnerable to Arbitrary Code Execution

April 1, 2025 (updated May 7, 2025)

Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code

Users are recommended to upgrade to version 1.15.1, which fixes the issue.

References

  • access.redhat.com/security/cve/CVE-2025-30065
  • github.com/advisories/GHSA-2c59-37c4-qrx5
  • github.com/apache/parquet-java
  • github.com/apache/parquet-java/issues/3168
  • github.com/apache/parquet-java/pull/3169
  • github.com/h3st4k3r/CVE-2025-30065/blob/main/POC-CVE-2025-30065-ParquetExploitGenerator.java
  • github.com/mouadk/parquet-rce-poc-CVE-2025-30065/blob/main/src/main/java/com/evil/GenerateMaliciousParquetSSRF.java
  • issues.apache.org/jira/browse/AVRO-3985
  • lists.apache.org/thread/okzqb3kn479gqzxm21gg5vqr35om9gw5
  • news.ycombinator.com/item?id=43603091
  • nvd.nist.gov/vuln/detail/CVE-2025-30065
  • www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet

Code Behaviors & Features

Detect and mitigate CVE-2025-30065 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.15.1

Fixed versions

  • 1.15.1

Solution

Upgrade to version 1.15.1 or above.

Weakness

  • CWE-502: Deserialization of Untrusted Data

Source file

maven/org.apache.parquet/parquet-avro/CVE-2025-30065.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:00 +0000.