Monday, May 12, 2025
HomeCVE/vulnerabilityApache Parquet Java Vulnerability Enables Remote Code Execution

Apache Parquet Java Vulnerability Enables Remote Code Execution

Published on

SIEM as a Service

Follow Us on Google News

A high-severity vulnerability (CVE-2025-46762) has been discovered in Apache Parquet Java, exposing systems using the parquet-avro module to remote code execution (RCE) attacks.

The flaw, disclosed by Apache Parquet contributor Gang Wu on May 2, 2025, impacts versions up to and including 1.15.1.

Technical Breakdown of the Vulnerability

The vulnerability stems from insecure schema parsing in the parquet-avro module. Attackers could embed malicious code within Parquet file metadata, which executes automatically when a vulnerable system reads the file’s Avro schema.

- Advertisement - Google News

While Apache Parquet 1.15.1 introduced partial mitigations by restricting untrusted packages, its default “trusted packages” configuration still permits code execution from pre-approved Java packages (e.g., java.util).

  • Requires use of the specific” or “reflect data models (not the safer “generic” model).
  • Vulnerable systems must process attacker-controlled Parquet files.

Affected Systems

  • All Apache Parquet Java versions ≤ 1.15.1.
  • Applications leveraging parquet-avro for deserialization in big data frameworks like Apache Spark, Hadoop, or Flink.

Mitigation Strategies

The Apache Software Group recommends immediate action:

  1. Upgrade to Parquet Java 1.15.2, which fully resolves the issue by tightening package trust boundaries.
  2. For systems stuck on 1.15.1, set the JVM system property:
    -Dorg.apache.parquet.avro.SERIALIZABLE_PACKAGES= (empty string).

Organizations should also audit data pipelines to ensure the “generic” Avro model is used where possible, as it is immune to this exploit.

Security experts warn that unpatched systems are at risk of supply chain attacks, where corrupted Parquet files trigger backend exploits.

“This is a textbook example of how serialization vulnerabilities can bypass perimeter defenses,” said Maria Chen, CTO of cybersecurity firm DataShield. “Attackers could weaponize common data formats to infiltrate analytics platforms.”

The Apache team has released updated documentation emphasizing secure configuration practices for Avro schema handling.

Organizations handling sensitive data are urged to prioritize patching, as proof-of-concept exploits for similar vulnerabilities often emerge within days of public disclosure.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...

Hackers Exploit Legacy Protocols in Microsoft Entra ID to Bypass MFA and Conditional Access

A sophisticated and highly coordinated cyberattack campaign came to light, as tracked by Guardz...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Metasploit Update Adds Erlang/OTP SSH Exploit and OPNSense Scanner

The open-source penetration testing toolkit Metasploit has unveiled a major update, introducing four new...

Google Researchers Use Mach IPC to Uncover Sandbox Escape Vulnerabilities

Google Project Zero researchers have uncovered new sandbox escape vulnerabilities in macOS using an...

Cybercriminals Hide Undetectable Ransomware Inside JPG Images

A chilling new ransomware attack method has emerged, with hackers exploiting innocuous JPEG image...