CVE-2025-2622

A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://gitee.com/aizuda/snail-job/issues/IBSQ24 Exploit Issue Tracking Third Party Advisory
https://gitee.com/aizuda/snail-job/issues/IBSQ24#note_38500450_link Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.300624 Permissions Required VDB Entry
https://vuldb.com/?id.300624 Third Party Advisory VDB Entry
https://vuldb.com/?submit.518999 Exploit Third Party Advisory VDB Entry
https://gitee.com/aizuda/snail-job/issues/IBSQ24 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:aizuda:snail-job:1.4.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-03-22 17:15

Updated : 2025-03-26 18:38


NVD link : CVE-2025-2622

Mitre link : CVE-2025-2622

CVE.ORG link : CVE-2025-2622


JSON object : View

Products Affected

aizuda

  • snail-job
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data

NVD-CWE-noinfo