Jul 20, 2023 in News

2 min read

Please upgrade your Metabase immediately

Sameer Al-Sakran Portrait
Sameer Al-Sakran
‧ Jul 20, 2023 in News

‧ 2 min read

Please upgrade your Metabase immediately Image
Share this article

We’ve patched an additional vulnerability since this post was published.

TL;DR: Upgrade your Metabase installation IMMEDIATELY.

A recently discovered security vulnerability almost certainly affects you (see below for details), and we recommend you upgrade your Metabase installation right away.

If you are a Metabase Enterprise customer

You can access the latest patched release version at:

If you are using the open source edition of Metabase

You can access the latest patched release version at:

For older versions of Metabase

We have also issued the following versions to patch prior versions of Metabase that were affected by the vulnerability:

  • v0.45.4.1 and v1.45.4.1
  • v0.44.7.1 and v1.44.7.1
  • v0.43.7.2 and v1.43.7.2

These versions are available at https://github.com/metabase/metabase/releases.

What happened?

We were informed by a third party security researcher that they discovered a vulnerability in Metabase.

What is the severity of the vulnerability?

Extremely severe. An unauthenticated attacker can run arbitrary commands with the same privileges as the Metabase server on the server you are running Metabase on.

Has this been exploited?

To the best of our current knowledge, there has been no known exploitation of this vulnerability. We audited our own systems, and were not able to find any malicious use of this.

If I am running a fork, what should I do?

Reach out to help@metabase.com and we’ll walk you through patching your systems.

Am I at risk?

If you are not on Metabase Cloud and you are running version X.43 of Metabase or later, you are at risk. Please upgrade immediately.

I’m a Metabase Cloud customer, do I need to do anything?

You don’t need to do anything. We already fixed and patched your Metabase as soon as we knew about the vulnerability. We have also audited network access to all customer instances and have not been able to find any non-pen test exploitation of this vulnerability.

Will you release any information about the vulnerability?

Yes, we’ll be releasing the patch publicly, as well as a CVE and an explanation in two weeks. We’re delaying release to give our install base a bit of extra time before this is widely exploited.

You might also enjoy

All posts
Choose where your Metabase Cloud is hosted Image Oct 11, 2023 in News

Choose where your Metabase Cloud is hosted

Speed up your Metabase by hosting it closer to you and your data with new cloud-hosting options in the EU (Frankfurt), APAC (Singapore), or LATAM (São Paulo).

The Metabase Team Portrait
The Metabase Team

1 min read

Security incident post-mortem: July 2023 Image Aug 04, 2023 in News

Security incident post-mortem: July 2023

A recap of the H2 Unauthenticated Remote Code Execution Security vulnerability and our response.

The Metabase Team Portrait
The Metabase Team

17 min read

All posts
Close Form Button

Subscribe to our newsletter

Stay in touch with updates and news from Metabase. No spam, ever.