CVE-2025-62421

DataEase is a data visualization and analytics platform. In DataEase versions through 2.10.13, a stored cross-site scripting vulnerability exists due to improper file upload validation and authentication bypass. The StaticResourceApi interface defines a route upload/{fileId} that uses a URL path parameter where both the filename and extension of uploaded files are controllable by users. During permission validation, the TokenFilter invokes the WhitelistUtils#match method to determine if the URL path is in the allowlist. If the requestURI ends with .js or similar extensions, it is directly deemed safe and bypasses permission checks. This allows an attacker to access "upload/1.js" while specifying arbitrary file extensions, enabling the upload of HTML files containing malicious JavaScript. The vulnerability is fixed in version 2.10.14. No known workarounds exist.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*

History

24 Oct 2025, 13:10

Type Values Removed Values Added
CPE cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*
References () https://github.com/dataease/dataease/security/advisories/GHSA-2wmv-rr3p-pf43 - () https://github.com/dataease/dataease/security/advisories/GHSA-2wmv-rr3p-pf43 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
First Time Dataease dataease
Dataease

17 Oct 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-17 18:15

Updated : 2025-10-24 13:10


NVD link : CVE-2025-62421

Mitre link : CVE-2025-62421

CVE.ORG link : CVE-2025-62421


JSON object : View

Products Affected

dataease

  • dataease
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')