Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.3

DataEase MySQL Connection Bypass Allows File Access

CVE-2026-40899
Summary

DataEase versions 2.10.20 and below have a security flaw that lets an attacker access sensitive files on the server if they have an account. This is fixed in version 2.10.21, so update to the latest version.

Original title
DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a JDBC parameter blocklist bypass vulnerability in the MySQL datasource configuration. The M...
Original description
DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a JDBC parameter blocklist bypass vulnerability in the MySQL datasource configuration. The Mysql class uses Lombok's @Data annotation, which auto-generates a public setter for the illegalParameters field that contains the JDBC security blocklist. When a datasource configuration is submitted as JSON, Jackson deserialization calls setIllegalParameters with an attacker-supplied empty list, replacing the blocklist before getJdbc() validation runs. This allows an authenticated attacker to include dangerous JDBC parameters such as allowLoadLocalInfile=true, and by pointing the datasource at a rogue MySQL server, exploit the LOAD DATA LOCAL INFILE protocol feature to read arbitrary files from the DataEase server filesystem, including sensitive environment variables and database credentials. This issue has been fixed in version 2.10.21.
nvd CVSS4.0 8.3
Vulnerability type
CWE-183
Published: 16 Apr 2026 · Updated: 16 Apr 2026 · First seen: 16 Apr 2026