{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T08:39:20.303","vulnerabilities":[{"cve":{"id":"CVE-2022-39361","sourceIdentifier":"security-advisories@github.com","published":"2022-10-26T19:15:14.707","lastModified":"2024-11-21T07:18:07.077","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Metabase is data visualization software. Prior to versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9, H2 (Sample Database) could allow Remote Code Execution (RCE), which can be abused by users able to write SQL queries on H2 databases. This issue is patched in versions 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9, and 1.41.9. Metabase no longer allows DDL statements in H2 native queries."},{"lang":"es","value":"Metabase es un software de visualización de datos. En versiones anteriores a 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9 y 1.41.9, H2 (base de datos de muestra) podía permitir una ejecución de código remota (RCE), de la que podían abusar los usuarios capaces de escribir consultas SQL en las bases de datos H2. Este problema está parcheado en versiones 0.44.5, 1.44.5, 0.43.7, 1.43.7, 0.42.6, 1.42.6, 0.41.9 y 1.41.9. Metabase ya no permite las sentencias DDL en las consultas nativas H2"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"},{"lang":"en","value":"CWE-441"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"0.41.0","versionEndExcluding":"0.41.9","matchCriteriaId":"BCD50540-E323-41CE-9D9C-EDA8CB718E42"},{"vulnerable":true,"criteria":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"0.42.0","versionEndExcluding":"0.42.6","matchCriteriaId":"EF01C7BF-CB4C-4990-9082-587CFD555225"},{"vulnerable":true,"criteria":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"0.43.0","versionEndExcluding":"0.43.7","matchCriteriaId":"8858058E-C597-4752-8625-9B279DC65A48"},{"vulnerable":true,"criteria":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"0.44.0","versionEndExcluding":"0.44.5","matchCriteriaId":"6A94F7EA-BC18-4013-9A93-7962226FDD98"},{"vulnerable":true,"criteria":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"1.41.0","versionEndExcluding":"1.41.9","matchCriteriaId":"804B84E1-5D1A-4251-9829-65F5FD927D99"},{"vulnerable":true,"criteria":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"1.42.0","versionEndExcluding":"1.42.6","matchCriteriaId":"73310924-8CD4-4696-89B9-EED3390375A6"},{"vulnerable":true,"criteria":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"1.43.0","versionEndExcluding":"1.43.7","matchCriteriaId":"A86AA0C8-2C4F-4DDD-8371-6B43611E2479"},{"vulnerable":true,"criteria":"cpe:2.3:a:metabase:metabase:*:*:*:*:*:*:*:*","versionStartIncluding":"1.44.0","versionEndExcluding":"1.44.5","matchCriteriaId":"EF7A60F6-5062-4094-91A5-71445F9B7BC1"}]}]}],"references":[{"url":"https://github.com/metabase/metabase/security/advisories/GHSA-gqpj-wcr3-p88v","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/metabase/metabase/security/advisories/GHSA-gqpj-wcr3-p88v","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}