CVE-2025-57773

DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.12, because DB2 parameters are not filtered, a JNDI injection attack can be directly launched. JNDI triggers an AspectJWeaver deserialization attack, writing to various files. This vulnerability requires commons-collections 4.x and aspectjweaver-1.9.22.jar. The vulnerability has been fixed in version 2.10.12.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*

History

03 Sep 2025, 13:43

Type Values Removed Values Added
CPE cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*
First Time Dataease dataease
Dataease
Summary
  • (es) DataEase es una herramienta de código abierto para inteligencia empresarial y visualización de datos. Antes de la versión 2.10.12, dado que los parámetros de DB2 no se filtraban, se podía lanzar directamente un ataque de inyección JNDI. JNDI desencadena un ataque de deserialización de AspectJWeaver, escribiendo en varios archivos. Esta vulnerabilidad requiere commons-collections 4.x y aspectjweaver-1.9.22.jar. La vulnerabilidad se ha corregido en la versión 2.10.12.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/dataease/dataease/commit/8d04e92d44e1bac9284e9e64df5afd7f96d9373c - () https://github.com/dataease/dataease/commit/8d04e92d44e1bac9284e9e64df5afd7f96d9373c - Patch
References () https://github.com/dataease/dataease/security/advisories/GHSA-7r8j-6whv-4j5p - () https://github.com/dataease/dataease/security/advisories/GHSA-7r8j-6whv-4j5p - Exploit, Third Party Advisory

25 Aug 2025, 20:24

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-25 17:15

Updated : 2025-09-03 13:43


NVD link : CVE-2025-57773

Mitre link : CVE-2025-57773

CVE.ORG link : CVE-2025-57773


JSON object : View

Products Affected

dataease

  • dataease
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-502

Deserialization of Untrusted Data