Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code Users are recommended to upgrade to version 1.15.1, which fixes the issue.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://lists.apache.org/thread/okzqb3kn479gqzxm21gg5vqr35om9gw5 | vendor advisory mailing list release notes |
http://www.openwall.com/lists/oss-security/2025/04/01/1 | mailing list third party advisory |
https://access.redhat.com/security/cve/CVE-2025-30065 | third party advisory issue tracking |
https://github.com/apache/parquet-java/pull/3169 | issue tracking patch |
https://news.ycombinator.com/item?id=43603091 | issue tracking third party advisory |
https://www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/ | exploit press/media coverage third party advisory |
https://github.com/h3st4k3r/CVE-2025-30065/blob/main/POC-CVE-2025-30065-ParquetExploitGenerator.java | third party advisory |
https://github.com/mouadk/parquet-rce-poc-CVE-2025-30065/blob/main/src/main/java/com/evil/GenerateMaliciousParquetSSRF.java | third party advisory |