First published: Sat Mar 22 2025(Updated: )
A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
aizuda snail-job | ||
maven/com.aizuda:snail-job | =1.4.0 | |
aizuda snail-job | =1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2622 has been classified as critical.
The affected component is the Workflow-Task Management Module of aizuda snail-job.
CVE-2025-2622 exploits vulnerabilities in the function getRuntime by manipulating the nodeExpression argument.
CVE-2025-2622 affects aizuda snail-job version 1.4.0.
Users should review their implementation of the Workflow-Task Management Module and apply security patches as recommended.