CVE-2025-10703 | Progress DataDirect Connect for JDBC for Amazon Redshift code injection
A vulnerability classified as critical has been found in Progress DataDirect Connect for JDBC for Amazon Redshift, DataDirect Connect for JDBC for Apache Cassandra, DataDirect Connect for JDBC for Hive, DataDirect Connect for JDBC for Apache Impala, DataDirect Connect for JDBC for Apache SparkSQL, DataDirect Connect for JDBC Autonomous REST Connector, DataDirect Connect for JDBC for DB2, DataDirect Connect for JDBC for Google Analytics 4, DataDirect Connect for JDBC for Google BigQuery, DataDirect Connect for JDBC for Greenplum, DataDirect Connect for JDBC for Informix, DataDirect Connect for JDBC for Microsoft Dynamics 365, DataDirect Connect for JDBC for Microsoft SQLServer, DataDirect Connect for JDBC for Microsoft Sharepoint, DataDirect Connect for JDBC for MongoDB, DataDirect Connect for JDBC for MySQL, DataDirect Connect for JDBC for Oracle Database, DataDirect Connect for JDBC for Oracle Eloqua, DataDirect Connect for JDBC for Oracle Sales Cloud, DataDirect Connect for JDBC for Oracle Service Cloud, DataDirect Connect for JDBC for PostgreSQL, DataDirect Connect for JDBC for OpenEdge, DataDirect Connect for JDBC for Salesforce, DataDirect Connect for JDBC for SAP HANA, DataDirect Connect for JDBC for SAP S, 4 HANA, DataDirect Connect for JDBC for Sybase ASE, DataDirect Connect for JDBC for Snowflake, DataDirect Hybrid Data Pipeline Server, DataDirect Hybrid Data Pipeline JDBC Driver, DataDirect Hybrid Data Pipeline On Premises Connector, DataDirect Hybrid Data Pipeline Docker and DataDirect OpenAccess JDBC Driver. Affected is an unknown function. This manipulation causes code injection.
This vulnerability is tracked as CVE-2025-10703. The attack is possible to be carried out remotely. No exploit exists.
It is recommended to upgrade the affected component.VulDB Recent EntriesRead More