Metabase Enterprise < 1.54.22 / 1.55.x < 1.55.22 / 1.56.x < 1.56.22 / 1.57.x < 1.57.16 / 1.58.x < 1.58.10 / 1.59.x < 1.59.4 RCE (GHSA-fppj-vcm3-w229)

high Nessus Plugin ID 304390

Synopsis

The remote host is affected by a remote code execution vulnerability.

Description

The version of Metabase Enterprise installed on the remote host is prior to 1.54.22, 1.55.x prior to 1.55.22, 1.56.x prior to 1.56.22, 1.57.x prior to 1.57.16, 1.58.x prior to 1.58.10, or 1.59.x prior to 1.59.4. It is, therefore, affected by a remote code execution vulnerability:

- Authenticated admins on Metabase Enterprise Edition can achieve Remote Code Execution (RCE) and Arbitrary File Read via the POST /api/ee/serialization/import endpoint. A crafted serialization archive injects an INIT property into the H2 JDBC spec, which can execute arbitrary SQL during a database sync. (CVE-2026-33725)

Note that this vulnerability only affects Metabase Enterprise Edition. Metabase OSS is not affected.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Metabase Enterprise version 1.54.22, 1.55.22, 1.56.22, 1.57.16, 1.58.10, 1.59.4, or later.

See Also

http://www.nessus.org/u?7db839fc

Plugin Details

Severity: High

ID: 304390

File Name: metabase_CVE-2026-33725.nasl

Version: 1.2

Type: remote

Family: CGI abuses

Published: 3/31/2026

Updated: 4/1/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:M/C:C/I:C/A:C

CVSS Score Source: CVE-2026-33725

CVSS v3

Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:metabase:metabase

Required KB Items: installed_sw/Metabase

Exploit Ease: No known exploits are available

Patch Publication Date: 3/24/2026

Vulnerability Publication Date: 3/24/2026

Reference Information

CVE: CVE-2026-33725