Impact
A flaw in Dromara warm-flow up to version 1.8.4 allows attackers to inject code through the SpelHelper.parseExpression function used in the Workflow Definition Handler. By manipulating the listenerPath, skipCondition, or permissionFlag parameters, an attacker can execute arbitrary code. The vulnerability is exploitable remotely, and the attack code has already been released to the public.
Affected Systems
The affected product is warm-flow from Dromara. Any installation using version 1.8.4 or earlier is vulnerable.
Risk and Exploitability
The CVSS score is 5.3, indicating a moderate risk level. EPSS data is not available, but the vulnerability is not listed in the CISA KEV catalog. Since the flaw is exploitable from remote sources and public exploit code exists, the likelihood of exploitation is significant. Organizations should treat this as a high priority when deploying or maintaining warm-flow on their systems.
OpenCVE Enrichment
Github GHSA