Back to CVE risk briefs

External risk intelligence

Pentaho Data Integration could allow a data source administrator to execute arbitrary scripts

Hitachi Vantara Pentaho Data Integration could allow a data source administrator to execute arbitrary scripts, potentially compromising admin access or exposing sensitive customer data. This vulnerability is limited to internal administrative workflows.

NVD published May 13, 2026 (2 days ago)

External risk briefCRITICAL

CVE-2025-11159

Halo Surface Signal

1/ 5

The vulnerability is triggered during specific internal administrative workflows when a data source administrator creates a database connection. This activity is confined to internal management and configuration processes and does not represent a public-facing network service or internet-accessible interface.

Exposure facts

H – Horizon Alert

A security issue has been identified in Hitachi Vantara Pentaho Data Integration & Analytics involving the component used to connect to H2 databases. This flaw allows for the potential execution of unauthorized external scripts whenever a data source administrator establishes a new connection. Because this vulnerability affects how the platform processes database interactions, it could enable unauthorized code execution, posing a risk to the integrity of the affected systems.

A – Asset Exposure

This vulnerability impacts Hitachi Vantara Pentaho Data Integration & Analytics environments that utilize H2 database connections. Because the issue arises during the configuration of data sources, the risk is typically limited to internal administrative workflows rather than public-facing applications. If this process is targeted, it could allow for unauthorized script execution on the server, potentially resulting in compromised admin access or the exposure of sensitive customer data housed within connected databases.

L – Live Threat

Currently, there is no evidence of active exploitation or observed targeting associated with this vulnerability. The available documentation does not indicate that public exploit code or proof-of-concept activity is circulating at this time. Consequently, we are not observing elevated external risk signals related to this issue.

O – Operational Fix

To address the identified vulnerability in the database driver, please have your technical team review the latest guidance provided by Hitachi Vantara. The vendor has released an official resolution that addresses this dependency issue. We recommend prioritizing the application of these vendor-supplied updates to ensure your environment is appropriately secured. Please consult the official support documentation to determine the necessary implementation steps for your specific deployment.

References