Critical H2 Database Vulnerability (CVE-2022-45868, CVSS 8.4) Found in Active Project Dependency
A critical, unpatched vulnerability in the H2 database engine has been flagged as directly reachable within a software project's build pipeline. The security scan identified `h2-2.1.214.jar` as a direct dependency carrying CVE-2022-45868, a high-severity flaw with a CVSS score of 8.4. The finding is marked with a red 'reachable' status, indicating the vulnerable code path is active and potentially exploitable in the application's runtime environment, significantly elevating the immediate risk.
The vulnerable library is embedded in the `/workflow-bot-app/build.gradle` file, cached within the project's Gradle build system. H2 is a popular, lightweight Java SQL database often used for development, testing, and embedded applications. The severity of 8.4 places it in the 'High' risk category, but the most critical detail is the exploit maturity and remediation status: the field for 'Fixed in' is listed as 'N/A', and 'Remediation Available' is marked with a red 'X', confirming no official patch from the vendor currently exists to address this specific flaw.
This scenario creates a pressing operational security dilemma. Development and security teams are left with limited mitigation options, such as potentially removing or replacing the dependency, implementing strict network controls, or accepting the risk. The 'reachable' designation means the vulnerability isn't just a dormant library; it's part of an accessible code path, making the project susceptible to attacks that could lead to unauthorized data access, system compromise, or service disruption. The absence of a vendor patch shifts the entire burden of risk management onto the project maintainers.