๐Ÿ” CVE Alert

CVE-2026-33725

HIGH 7.2

Metabase vulnerable to RCE and Arbitrary File Read via H2 JDBC INIT Injection in EE Serialization Import

CVSS Score
7.2
EPSS Score
0.3%
EPSS Percentile
52th

Metabase is an open source business intelligence and embedded analytics tool. In Metabase Enterprise prior to versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4, authenticated admins on Metabase Enterprise Edition can achieve Remote Code Execution (RCE) and Arbitrary File Read via the `POST /api/ee/serialization/import` endpoint. A crafted serialization archive injects an `INIT` property into the H2 JDBC spec, which can execute arbitrary SQL during a database sync. We confirmed this was possible on Metabase Cloud. This only affects Metabase Enterprise. Metabase OSS lacks the affected codepaths. All versions of Metabase Enterprise that have serialization, which dates back to at least version 1.47, are affected. Metabase Enterprise versions 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, and 1.59.4 patch the issue. As a workaround, disable the serialization import endpoint in their Metabase instance to prevent access to the vulnerable codepaths.

CWE CWE-502
Vendor metabase
Product metabase
Published Mar 27, 2026
Last Updated Mar 28, 2026
Stay Ahead of the Next One

Get instant alerts for metabase metabase

Be the first to know when new high vulnerabilities affecting metabase metabase are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

metabase / metabase
< 1.54.22 >= 1.55.0, < 1.55.22 >= 1.56.0, < 1.56.22 >= 1.57.0, < 1.57.16 >= 1.58.0, < 1.58.10 >= 1.59.0, < 1.59.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/metabase/metabase/security/advisories/GHSA-fppj-vcm3-w229