First published: Fri May 02 2025(Updated: )
Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code. While 1.15.1 introduced a fix to restrict untrusted packages, the default setting of trusted packages still allows malicious classes from these packages to be executed. The exploit is only applicable if the client code of parquet-avro uses the "specific" or the "reflect" models deliberately for reading Parquet files. ("generic" model is not impacted) Users are recommended to upgrade to 1.15.2 or set the system property "org.apache.parquet.avro.SERIALIZABLE_PACKAGES" to an empty string on 1.15.1. Both are sufficient to fix the issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Parquet | <1.15.0 | |
Apache Parquet | >=1.15.1<1.15.2 | |
maven/org.apache.parquet:parquet-avro | <1.15.2 | 1.15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-46762 is classified as a critical vulnerability due to its potential to allow arbitrary code execution.
To remediate CVE-2025-46762, upgrade to Apache Parquet version 1.15.2 or later.
Apache Parquet versions up to and including 1.15.0 and versions between 1.15.1 and 1.15.2 are affected by CVE-2025-46762.
CVE-2025-46762 can facilitate remote code execution attacks through malicious inputs in the parquet-avro module.
Yes, upgrading to Apache Parquet version 1.15.2 addresses the vulnerabilities associated with CVE-2025-46762.