// For flags

CVE-2023-38646

Metabase Remote Code Execution

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

40
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.

Metabase versions before 0.46.6.1 contain a flaw where the secret setup-token is accessible even after the setup process has been completed. With this token a user is able to submit the setup functionality to create a new database. When creating a new database, an H2 database string is created with a TRIGGER that allows for code execution. We use a sample database for our connection string to prevent corrupting real databases. Successfully tested against Metabase 0.46.6.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-07-21 CVE Reserved
  • 2023-07-21 CVE Published
  • 2023-07-29 First Exploit
  • 2024-08-02 CVE Updated
  • 2025-03-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (47)
URL Date SRC
https://packetstorm.news/files/id/174091 2023-08-09
https://packetstorm.news/files/id/177138 2024-02-15
https://github.com/robotmikhro/CVE-2023-38646 2023-08-11
https://github.com/Pyr0sec/CVE-2023-38646 2023-10-15
https://github.com/kh4sh3i/CVE-2023-38646 2023-08-19
https://github.com/SUT0L/CVE-2023-38646 2023-10-11
https://github.com/Red4mber/CVE-2023-38646 2023-10-26
https://github.com/AnvithLobo/CVE-2023-38646 2023-10-27
https://github.com/raytheon0x21/CVE-2023-38646 2023-08-11
https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase 2024-02-22
https://github.com/j0yb0y0h/CVE-2023-38646 2023-11-09
https://github.com/xchg-rax-rax/CVE-2023-38646 2024-05-27
https://github.com/threatHNTR/CVE-2023-38646 2023-10-17
https://github.com/Ego1stoo/CVE-2023-38646 2023-11-26
https://github.com/birdm4nw/CVE-2023-38646 2023-10-17
https://github.com/junnythemarksman/CVE-2023-38646 2024-06-04
https://github.com/securezeron/CVE-2023-38646 2023-07-30
https://github.com/0xrobiul/CVE-2023-38646 2023-07-29
https://github.com/nickswink/CVE-2023-38646 2023-10-12
https://github.com/Zenmovie/CVE-2023-38646 2023-07-31
https://github.com/shamo0/CVE-2023-38646-PoC 2023-08-03
https://github.com/fidjiw/CVE-2023-38646-POC 2023-08-03
https://github.com/Chocapikk/CVE-2023-38646 2023-07-30
https://github.com/Xuxfff/CVE-2023-38646-Poc 2023-07-30
https://github.com/alexandre-pecorilla/CVE-2023-38646 2023-10-08
https://github.com/Mrunalkaran/CVE-2023-38646 2023-11-07
https://github.com/asepsaepdin/CVE-2023-38646 2023-10-14
https://github.com/yxl2001/CVE-2023-38646 2023-10-08
https://github.com/passwa11/CVE-2023-38646 2023-10-11
https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646- 2024-02-20
https://github.com/0utl4nder/Another-Metabase-RCE-CVE-2023-38646 2023-12-12
https://github.com/CN016/Metabase-H2-CVE-2023-38646- 2023-10-10
https://github.com/Pumpkin-Garden/POC_Metabase_CVE-2023-38646 2024-04-20
https://github.com/Any3ite/cve-2023-38646-metabase-ReverseShell 2024-06-21
https://github.com/m3m0o/metabase-pre-auth-rce-poc 2024-11-17
https://github.com/Boogipop/MetabaseRceTools 2024-11-29
https://github.com/Shisones/MetabaseRCE_CVE-2023-38646 2024-02-04
https://github.com/DaniTheHack3r/CVE-2023-38646 2024-03-04
https://github.com/XiaomingX/cve-2023-38646-poc 2024-12-02
https://github.com/JayRyz/CVE-2023-38646-PoC-Metabase 2024-11-27
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
< 0.43.7.2
Search vendor "Metabase" for product "Metabase" and version " < 0.43.7.2"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
< 1.43.7.2
Search vendor "Metabase" for product "Metabase" and version " < 1.43.7.2"
enterprise
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 0.44.0 < 0.44.7.1
Search vendor "Metabase" for product "Metabase" and version " >= 0.44.0 < 0.44.7.1"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 0.45.0 < 0.45.4.1
Search vendor "Metabase" for product "Metabase" and version " >= 0.45.0 < 0.45.4.1"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 0.46.0 < 0.46.6.1
Search vendor "Metabase" for product "Metabase" and version " >= 0.46.0 < 0.46.6.1"
-
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 1.44.0 < 1.44.7.1
Search vendor "Metabase" for product "Metabase" and version " >= 1.44.0 < 1.44.7.1"
enterprise
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 1.45.0 < 1.45.4.1
Search vendor "Metabase" for product "Metabase" and version " >= 1.45.0 < 1.45.4.1"
enterprise
Affected
Metabase
Search vendor "Metabase"
Metabase
Search vendor "Metabase" for product "Metabase"
>= 1.46.0 < 1.46.6.1
Search vendor "Metabase" for product "Metabase" and version " >= 1.46.0 < 1.46.6.1"
enterprise
Affected