CVE-2025-2622 – “Aizuda Snail-Job Remote Deserialization Vulnerability”

The following table lists the changes that have been made to the
CVE-2025-2622 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Mar. 22, 2025

    Action Type Old Value New Value
    Added Description A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V3.1 AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
    Added CVSS V2 (AV:N/AC:L/Au:S/C:P/I:P/A:P)
    Added CWE CWE-20
    Added CWE CWE-502
    Added Reference https://gitee.com/aizuda/snail-job/issues/IBSQ24
    Added Reference https://gitee.com/aizuda/snail-job/issues/IBSQ24#note_38500450_link
    Added Reference https://vuldb.com/?ctiid.300624
    Added Reference https://vuldb.com/?id.300624
    Added Reference https://vuldb.com/?submit.518999
Share the Post:

Related Posts