Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. Critical RCE in Hitachi Vantara Pentaho via Unrestricted
Critical RCE in Hitachi Vantara Pentaho via Unrestricted

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2025-11158

Critical RCE in Hitachi Vantara Pentaho via Unrestricted

Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.6 fail to restrict Groovy scripts in PRPT reports, allowing privileged users...

Dylan H.

Security Team

March 11, 2026
6 min read

Affected Products

  • Hitachi Vantara Pentaho Data Integration & Analytics < 10.2.0.6
  • Hitachi Vantara Pentaho 9.3.x
  • Hitachi Vantara Pentaho 8.3.x

Executive Summary

A critical missing authorization vulnerability (CVE-2025-11158) has been disclosed in Hitachi Vantara Pentaho Data Integration & Analytics, a widely used enterprise analytics and ETL platform. The flaw allows authenticated users — without elevated system permissions — to embed arbitrary Groovy scripts inside PRPT report files published to the server, resulting in remote code execution (RCE) on the host.

CVSS Score: 9.1 (Critical) | CWE: CWE-862 (Missing Authorization)

The vulnerability affects all versions before 10.2.0.6, including the 9.3.x and 8.3.x branches. Hitachi Vantara has released a patch in version 10.2.0.6; organizations running unpatched instances — particularly those with internal or partner user access — should treat this as an urgent remediation item.


Vulnerability Overview

AttributeValue
CVE IDCVE-2025-11158
CVSS Score9.1 (Critical)
CWECWE-862 — Missing Authorization
TypeRemote Code Execution via Unrestricted Script Execution
Attack VectorNetwork
Privileges RequiredLow (authenticated user account)
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
Patch AvailableYes — version 10.2.0.6+

Affected Versions

ProductAffected VersionsFixed Version
Pentaho Data Integration & Analytics< 10.2.0.610.2.0.6
Pentaho Data Integration & Analytics9.3.x (all)Apply vendor patch
Pentaho Data Integration & Analytics8.3.x (all)Apply vendor patch

Technical Analysis

Root Cause

Pentaho PRPT (Pentaho Report Template) files support embedded Groovy scripts as a legitimate feature for dynamic report generation. The vulnerability stems from a failure to apply authorization checks when a user publishes a new PRPT report that contains Groovy code.

The Pentaho server does not validate whether the user has the authority to execute server-side scripts before processing embedded Groovy blocks in the uploaded report. When the report is subsequently rendered or triggered, the Groovy code executes with the privileges of the Pentaho server process.

Attack Flow

1. Attacker authenticates to Pentaho with any valid user account
2. Attacker crafts a PRPT report file containing a malicious Groovy script
   (e.g., reverse shell, credential dumper, persistence mechanism)
3. Attacker publishes the report to the Pentaho repository via the BI Server
4. The server accepts the report without auditing or restricting Groovy content
5. Report is rendered/executed — Groovy script fires on the server
6. Attacker achieves code execution under the Pentaho service account
7. Lateral movement to connected databases, data warehouses, and ETL pipelines

Why This Is Dangerous

Pentaho is an enterprise-grade analytics and ETL platform commonly integrated with:

  • Corporate data warehouses (Snowflake, Redshift, BigQuery, Oracle)
  • Operational databases holding PII and financial records
  • CI/CD pipelines and data pipelines
  • LDAP/Active Directory for authentication

A compromised Pentaho server can expose the entire data fabric of an enterprise.


Impact Assessment

Impact AreaDescription
Remote Code ExecutionFull server-side code execution under the Pentaho service account
Data ExfiltrationAccess to all connected data sources — warehouses, databases, file shares
Credential TheftPentaho stores JDBC credentials and LDAP binds; all are at risk
Lateral MovementPivot to connected databases, AD environments, and cloud infrastructure
PersistenceInstall backdoors, modify scheduled reports to re-execute payload
Supply Chain RiskCompromise of ETL pipelines can corrupt downstream data and reports

Immediate Remediation

Step 1: Upgrade to Version 10.2.0.6

Apply the vendor patch immediately. Obtain the update from the Hitachi Vantara support portal.

# Verify installed version before patching
cat /opt/pentaho/server/biserver-ee/tomcat/webapps/pentaho/META-INF/MANIFEST.MF | grep Implementation-Version
 
# After upgrade, confirm version
cat /opt/pentaho/server/biserver-ee/tomcat/webapps/pentaho/META-INF/MANIFEST.MF | grep Implementation-Version
# Expected: 10.2.0.6 or higher

Step 2: Restrict Report Publishing Permissions

If an immediate upgrade is not possible, restrict which roles can publish PRPT reports:

  1. Navigate to Pentaho User Console > Administration > Roles
  2. Identify roles with "Publish Content" or "Create Content" permissions
  3. Remove this permission from any role not explicitly requiring it
  4. Only trusted administrators should retain publishing rights

Step 3: Audit Published Reports for Groovy Payloads

# Search for Groovy script blocks in all PRPT files in the repository
find /opt/pentaho/server/pentaho-solutions/ -name "*.prpt" -exec grep -l "groovy" {} \;
 
# Inspect suspicious reports
unzip -p suspicious_report.prpt content.xml | grep -i "groovy\|exec\|runtime\|process"

Step 4: Monitor for Active Exploitation

# Review Pentaho application logs for unusual report executions
grep -i "groovy\|script\|exec\|Runtime" /opt/pentaho/server/biserver-ee/tomcat/logs/catalina.out | tail -200
 
# Check for unusual outbound network connections from the Pentaho host
ss -tnp | grep -E "java|pentaho"
netstat -tnp 2>/dev/null | grep ESTABLISHED | grep java

Detection Indicators

IndicatorDescription
PRPT files containing <groovy> or <script> blocksSuspicious report file content
Unexpected outbound TCP connections from Pentaho hostPotential reverse shell or C2
New processes spawned by the Pentaho Java processCode execution via Runtime.exec()
Unusual database queries from Pentaho service accountPost-exploitation data access
New scheduled jobs or modified report schedulesPersistence mechanism

Post-Remediation Checklist

  1. Upgrade all Pentaho instances to 10.2.0.6 or later
  2. Audit all published PRPT reports for embedded Groovy scripts
  3. Review and restrict "Publish Content" permissions to trusted roles only
  4. Rotate all credentials stored in Pentaho — JDBC, LDAP, API keys
  5. Review service account permissions — apply least privilege to the Pentaho OS user
  6. Enable enhanced logging for report publication and execution events
  7. Implement network segmentation — Pentaho servers should not have unrestricted outbound internet access
  8. Notify data owners if a compromise is suspected — connected data sources may be affected

References

  • NVD — CVE-2025-11158
  • VulDB — CVE-2025-11158 Entry
  • Tenable — CVE-2025-11158
  • OffSeq Threat Radar — CVE-2025-11158 Intelligence
  • Hitachi Vantara Security Advisories
#CVE-2025-11158#Hitachi Vantara#Pentaho#RCE#Groovy#Missing Authorization#Business Intelligence

Related Articles

CVE-2026-27876 — Grafana Critical RCE via SQL Expression Chain

A chained attack exploiting SQL Expressions combined with a Grafana Enterprise plugin can lead to remote arbitrary code execution. All Grafana users should update immediately to close this attack vector.

5 min read

CVE-2025-53521: F5 BIG-IP APM Remote Code Execution — CISA KEV (CVSS 9.8)

A critical unauthenticated RCE vulnerability in F5 BIG-IP APM is being actively exploited in the wild. Malicious traffic targeting access policy virtual servers triggers remote code execution. CISA has added this to the Known Exploited Vulnerabilities catalogue.

4 min read

CVE-2026-33478: AVideo CloneSite Plugin Unauthenticated RCE (CVSS 10.0)

A critical chain of vulnerabilities in WWBN AVideo's CloneSite plugin allows fully unauthenticated attackers to achieve remote code execution via key...

4 min read
Back to all Security Alerts