Anthropic design choice exposed 150M+ downloads, and 200K servers to complete takeover
cve 2025 11158 1

CVE-2025-11158: Critical RCE Found in Widely-Deployed Pentaho Platform, Putting Enterprise BI at Risk  

OX Security researchers discovered a Zero-Day vulnerability – CVE-2025-11158 -affecting 2,600+ publicly exposed Pentaho instances 

TL;DR

The OX Research team exploited a remote code execution vulnerability – CVE-2025-11158 –  in Pentaho: a zero-day vulnerability, related to CVE-2022-43938 (1-Day) allowing non-admin business users to run malicious Groovy scripts in reports — leading to full server compromise. 

Severity: Critical – 9.1 CVSS
Affected Versions: All versions of Pentaho up to 10.2.0.6, including 9.3.x and 8.3.x
Patched version: 11.0
Impact: This vulnerability allow attackers to execute arbitrary code on the server, leading to full system compromise and potential data theft or malware deployment.

Overview

Pentaho is a widely used open source enterprise data integration and analytics platform that helps organizations access, prepare, and analyze data from multiple sources through tools like Pentaho Data Integration and Pentaho Business Analytics. It’s trusted across industries such as marketing, Financial Services, Healthcare, and more, and is used by thousands of companies worldwide, including many in the Fortune 100 for scalable data workflows and business intelligence. Its broad adoption by enterprises and diverse user base — from IT and BI teams to data engineers — reflects its role in helping organizations unify and derive insights from complex data.

Based on our Shodan search, we identified approximately 2,607 publicly exposed Pentaho instances, all of which are potentially vulnerable to remote code execution.

What We Found

During our analysis of the Pentaho Platform, the OX Research team identified a distinct remote code execution vulnerability affecting the product.

It is a 0-day vulnerability (CVE-2025-11158) related to CVE-2022-43938, which allows a user with the “Business User” role to achieve remote code execution. Despite the existence of a prior fix, we identified a technique that still enables the injection of malicious Groovy scripts into report files created with Pentaho Report Designer. When these reports are uploaded and processed by the server, the embedded Groovy code is executed, allowing arbitrary system commands to run.

This vulnerability leads to remote code execution on the Pentaho server and can result in full system compromise under realistic attack scenarios.

Who Is Affected?

All organizations running the Pentaho Platform – versions up to 10.2.0.6, including 9.3.x and 8.3.x –  on publicly accessible servers are affected. The patched version is 11.0

Potential Damage

  • Remote code execution on the Pentaho server
  • Full system compromise with execution at the privileges of the Pentaho process
  • Theft or manipulation of sensitive data processed by Pentaho
  • Deployment of malware or persistence mechanisms on the server
  • Lateral movement to other systems within the internal network

Responsible Disclosure

We contacted Hitachi Vantara on 15-Jul-2025, and they responded that a fix will be issued. On March 9, 2026 the fix was made publicly available.

Recommendations

  • Apply the security patch from Hitachi Vantara.
  • Limit access to Pentaho servers to trusted internal networks and avoid public exposure whenever possible.
  • Restrict user roles and permissions, ensuring only trusted administrators have full access.
  • Monitor and audit report uploads and database connection inputs to detect unusual or suspicious activity.
  • Implement network segmentation and intrusion detection to reduce the risk of lateral movement in case of a compromise.

Technical Analysis – CVE-2025-11158

Attack Scenarios: How could this be exploited in the wild?

  1. A user with the Business User role can upload a malicious report file containing embedded Groovy code, which is executed when the report is processed by the server.
  2. Once code execution is achieved, an attacker can take full control of the Pentaho server, access sensitive data, deploy malware, and pivot to other systems within the internal network.

Attack Graph

image

How it works

The identified vulnerabilities in Pentaho stem from unsafe handling of user-controlled input in features that are designed to extend the platform’s flexibility, specifically database connectivity and report execution.

The vulnerability, relating to CVE-2022-43938, impacts Pentaho’s report handling functionality. Pentaho Report Designer allows users to create and upload reports that include data queries and logic. These reports support Groovy scripting, which runs on the Java Virtual Machine. Despite prior fixes, we identified a technique that allows a Business User to inject malicious Groovy code into the query section of a report file. When the report is uploaded and processed by the Pentaho server, the embedded Groovy script is executed with server-side privileges.

The core issue is that user-supplied input is executed by the backend without sufficient validation or sandboxing. This allows attackers to transform legitimate platform features into an execution vector, ultimately resulting in remote code execution and full system compromise.

RCE via Business User Role (Related to CVE-2022-43938)
We identified a technique by which a user with the Business User role can achieve RCE, using a method similar to that described in CVE-2022-43938, despite the applied fix.

Pentaho Report Designer allows users to create custom reports that include data queries and logic, which can then be uploaded and run on the Pentaho server. This feature introduces a serious vulnerability: attackers can inject malicious Groovy scripts into the query section of a report file.

When such a report is uploaded and processed by the Pentaho server-even by a non-admin “Business User” who has permission to upload reports-the embedded Groovy code is executed on the server. Because Groovy is a powerful scripting language that runs on the Java platform, it can be used to run arbitrary system commands.

As a result, this vulnerability enables remote code execution (RCE) on the server, allowing an attacker to potentially take control of the system, steal data, or perform other malicious actions-all by embedding code in what appears to be a regular report file.

Exploitation PoC

A PoC of the 0-day leading from business user to RCE on the server can be found here:

Too Good to BI True

This advisory is part of Too Good to BI True, OX Security’s research into the security posture of the most widely deployed open-source Business Intelligence platforms. Across five platforms, our researchers achieved full exploitation chains in every single one — reaching data that should never have been accessible. The findings include four zero-day discoveries and over 45,000 publicly exposed instances.

Read the advisories:

Download the full report →

post banner image

Run Every Security Test Your Code Needs

Pinpoint, investigate and eliminate code-level issues across the entire SDLC.

GET A PERSONALIZED DEMO
Group 1261153044

It’s time to secure your code the way software is built

Learn how VibeSec makes security part of your product creation from code to runtime