Description
A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2025-03-22
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-7298 A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Github GHSA Github GHSA GHSA-4m5h-5v4q-4xgq aizuda snail-job Vulnerable to Deserialization via `nodeExpression` Argument
History

Wed, 26 Mar 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Aizuda
Aizuda snail-job
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:aizuda:snail-job:1.4.0:*:*:*:*:*:*:*
Vendors & Products Aizuda
Aizuda snail-job

Mon, 24 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 22 Mar 2025 17:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Title aizuda snail-job Workflow-Task Management Module check-node-expression getRuntime deserialization
Weaknesses CWE-20
CWE-502
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Aizuda Snail-job
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-03-24T19:19:27.968Z

Reserved: 2025-03-21T20:31:30.845Z

Link: CVE-2025-2622

cve-icon Vulnrichment

Updated: 2025-03-24T19:19:18.211Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-22T17:15:35.213

Modified: 2025-03-26T18:38:53.113

Link: CVE-2025-2622

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.