Due to the improper input validation, a remote code execution attack could be carried out using malicious H2 JDBC Connection Strings.
The vendor's disclosure and fix for this vulnerability can be found here.
Neither me nor the vendor requested a CVE for this vulnerability.
This vulnerability requires:
- Valid user credentials
More details and the exploitation process can be found in this PDF.