Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and previous versions allows bad actors to execute arbitrary code Users are recommended to upgrade to version 1.15.1, which fixes the issue.
https://www.securityweek.com/critical-vulnerability-found-in-apache-roller-blog-server/
https://thehackernews.com/2025/04/critical-apache-roller-vulnerability.html
https://www.securityweek.com/critical-apache-parquet-vulnerability-leads-to-remote-code-execution/
https://thehackernews.com/2025/04/critical-flaw-in-apache-parquet-allows.html
https://securityaffairs.com/176187/security/apache-parquets-java-library-critical-flaw.html
Published: 2025-04-01
Updated: 2025-05-07
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
Base Score: 10
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Severity: Critical
EPSS: 0.00086
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability Being Monitored