CVE-2025-2622

A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://gitee.com/aizuda/snail-job/issues/IBSQ24 Exploit Issue Tracking Third Party Advisory
https://gitee.com/aizuda/snail-job/issues/IBSQ24#note_38500450_link Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.300624 Permissions Required VDB Entry
https://vuldb.com/?id.300624 Third Party Advisory VDB Entry
https://vuldb.com/?submit.518999 Exploit Third Party Advisory VDB Entry
https://gitee.com/aizuda/snail-job/issues/IBSQ24 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:aizuda:snail-job:1.4.0:*:*:*:*:*:*:*

History

26 Mar 2025, 18:38

Type Values Removed Values Added
CPE cpe:2.3:a:aizuda:snail-job:1.4.0:*:*:*:*:*:*:*
References () https://gitee.com/aizuda/snail-job/issues/IBSQ24 - () https://gitee.com/aizuda/snail-job/issues/IBSQ24 - Exploit, Issue Tracking, Third Party Advisory
References () https://gitee.com/aizuda/snail-job/issues/IBSQ24#note_38500450_link - () https://gitee.com/aizuda/snail-job/issues/IBSQ24#note_38500450_link - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.300624 - () https://vuldb.com/?ctiid.300624 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.300624 - () https://vuldb.com/?id.300624 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.518999 - () https://vuldb.com/?submit.518999 - Exploit, Third Party Advisory, VDB Entry
First Time Aizuda
Aizuda snail-job
CWE NVD-CWE-noinfo

24 Mar 2025, 20:15

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en aizuda snail-job 1.4.0. Se ha clasificado como crítica. La función getRuntime del archivo /snail-job/workflow/check-node-expression del componente Workflow-Task Management Module se ve afectada. La manipulación del argumento nodeExpression provoca la deserialización. Es posible ejecutar el ataque de forma remota. Se ha hecho público el exploit y puede que sea utilizado.
References () https://gitee.com/aizuda/snail-job/issues/IBSQ24 - () https://gitee.com/aizuda/snail-job/issues/IBSQ24 -

22 Mar 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-22 17:15

Updated : 2025-03-26 18:38


NVD link : CVE-2025-2622

Mitre link : CVE-2025-2622

CVE.ORG link : CVE-2025-2622


JSON object : View

Products Affected

aizuda

  • snail-job
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data

NVD-CWE-noinfo