Maximum Severity Vulnerability Discovered in Apache Parquet (CVE-2025-30065)

CVE-2025-30065

Filip Dimitrov

April 6, 2025

A maximum severity vulnerability (CVSS 10.0) has been discovered in Apache Parquet, a columnar storage format used extensively in big data platforms like Spark, Hadoop, AWS EMR, and data lakes across Netflix, Uber, LinkedIn, and more.

  • Vulnerability ID: CVE-2025-30065
  • Impact: Remote Code Execution (RCE)
  • Affected Versions: Up to and including 1.15.0
  • Fix: Upgrade to 1.15.1

The Flaw

The issue stems from schema parsing in the parquet-avro module, where deserialization of untrusted data allows attackers to craft malicious Parquet files and execute arbitrary code on vulnerable systems — with no authentication, privileges, or user interaction required.

Exploit Conditions

The attacker must trick the system into processing a malicious file, typically by uploading or importing it into a data pipeline.

Real-World Risk

Apache Parquet powers analytics pipelines and machine learning workflows across cloud-native stacks. A successful exploit could:

  • Lead to RCE on critical data infrastructure
  • Exfiltrate or tamper with sensitive data
  • Introduce payloads like ransomware
  • Disrupt cloud workloads

No active exploitation has been observed yet. But Apache vulnerabilities have historically been targeted within hours of public disclosure.

What We Recommend:

  • Patch ASAP: Upgrade to Parquet v1.15.1
  • Harden inputs: Only process Parquet files from trusted sources
  • Log & monitor systems handling Parquet ingestion
  • If you can’t upgrade immediately: quarantine all unverified Parquet data