Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code
Users are recommended to upgrade to version 1.15.1, which fixes the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 07 Apr 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 03 Apr 2025 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Wed, 02 Apr 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 01 Apr 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 01 Apr 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code Users are recommended to upgrade to version 1.15.1, which fixes the issue. | |
Title | Apache Parquet Java: Arbitrary code execution in the parquet-avro module when reading an Avro schema from a Parquet file metadata | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: apache
Published: 2025-04-01T07:53:42.993Z
Updated: 2025-05-02T03:55:15.515Z
Reserved: 2025-03-15T03:41:07.822Z
Link: CVE-2025-30065

Updated: 2025-04-07T02:18:14.331Z

Status : Awaiting Analysis
Published: 2025-04-01T08:15:15.283
Modified: 2025-04-07T03:15:21.750
Link: CVE-2025-30065
