The snailjob component in RuoYi-Vue-Plus versions 5.5.1 and earlier, interface /snail-job/workflow/check-node-expression can execute QLExpress expressions, but it does not filter user input, allowing attackers to use the File class to perform arbitrary file reading and writing.
References
| Link | Resource |
|---|---|
| https://gist.github.com/Catherines77/e3f06b9c4cc6298579e858088a243c3d | Third Party Advisory |
| https://gitee.com/dromara/RuoYi-Vue-Plus | Product |
| https://github.com/Catherines77/code-au/blob/main/ruoyi-vue-plus/QLExpress.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-08 20:15
Updated : 2026-01-30 01:05
NVD link : CVE-2025-66916
Mitre link : CVE-2025-66916
CVE.ORG link : CVE-2025-66916
JSON object : View
Products Affected
dromara
- ruoyi-vue-plus
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
