CVE-2025-30065: Apache Parquet Avro Module Vulnerable to Arbitrary Code Execution
(updated )
Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code
Users are recommended to upgrade to version 1.15.1, which fixes the issue.
References
- access.redhat.com/security/cve/CVE-2025-30065
- github.com/advisories/GHSA-2c59-37c4-qrx5
- github.com/apache/parquet-java
- github.com/apache/parquet-java/issues/3168
- github.com/apache/parquet-java/pull/3169
- github.com/h3st4k3r/CVE-2025-30065/blob/main/POC-CVE-2025-30065-ParquetExploitGenerator.java
- github.com/mouadk/parquet-rce-poc-CVE-2025-30065/blob/main/src/main/java/com/evil/GenerateMaliciousParquetSSRF.java
- issues.apache.org/jira/browse/AVRO-3985
- lists.apache.org/thread/okzqb3kn479gqzxm21gg5vqr35om9gw5
- news.ycombinator.com/item?id=43603091
- nvd.nist.gov/vuln/detail/CVE-2025-30065
- www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet
Code Behaviors & Features
Detect and mitigate CVE-2025-30065 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →