Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14674: Injection in aizuda snail-job

0
Medium
VulnerabilityCVE-2025-14674cvecve-2025-14674
Published: Sun Dec 14 2025 (12/14/2025, 18:02:14 UTC)
Source: CVE Database V5
Vendor/Project: aizuda
Product: snail-job

Description

A vulnerability was found in aizuda snail-job up to 1.6.0. Affected by this vulnerability is the function QLExpressEngine.doEval of the file snail-job-common/snail-job-common-core/src/main/java/com/aizuda/snailjob/common/core/expression/strategy/QLExpressEngine.java. The manipulation results in injection. The attack can be launched remotely. Upgrading to version 1.7.0-beta1 addresses this issue. The patch is identified as 978f316c38b3d68bb74d2489b5e5f721f6675e86. The affected component should be upgraded.

AI-Powered Analysis

AILast updated: 12/14/2025, 18:35:17 UTC

Technical Analysis

CVE-2025-14674 is an injection vulnerability identified in the aizuda snail-job software, specifically in the QLExpressEngine.doEval function located in the snail-job-common-core module. This function evaluates expressions, and due to improper input handling, it allows an attacker to inject malicious code remotely. The vulnerability affects all versions up to 1.6.0 and does not require authentication or user interaction, making it remotely exploitable over the network. Injection vulnerabilities typically allow attackers to execute arbitrary code or commands, manipulate data, or disrupt service availability. The vulnerability was patched in version 1.7.0-beta1, with the patch identified by commit 978f316c38b3d68bb74d2489b5e5f721f6675e86. The CVSS 4.0 vector indicates low complexity, no privileges required, and no user interaction, but with limited impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, but the potential for remote code execution or data manipulation exists if exploited. Organizations using snail-job for job scheduling or automation should consider this a priority update to prevent exploitation.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to those using aizuda snail-job for task automation, job scheduling, or workflow orchestration. Exploitation could allow attackers to inject malicious expressions remotely, potentially leading to unauthorized code execution, data corruption, or service disruption. This could affect business continuity, data integrity, and confidentiality, especially in sectors relying heavily on automated processes such as manufacturing, finance, and IT services. The lack of required authentication increases the risk of exploitation by external attackers. While no active exploits are known, the presence of this vulnerability in critical automation infrastructure could be leveraged for lateral movement or persistence in targeted attacks. The impact is mitigated somewhat by the limited scope of the vulnerability and the availability of a patch, but organizations must act promptly to avoid operational and reputational damage.

Mitigation Recommendations

European organizations should immediately assess their use of aizuda snail-job and identify any deployments running versions 1.0 through 1.6.0. The primary mitigation is to upgrade to version 1.7.0-beta1 or later, which contains the official patch. Until the upgrade is applied, organizations should restrict network access to the snail-job service to trusted internal networks only, implement strict input validation and monitoring around the QLExpressEngine usage, and deploy intrusion detection systems to identify anomalous expression evaluations. Additionally, organizations should review logs for suspicious activity related to expression evaluation and consider isolating affected systems to limit potential lateral movement. Regularly updating software dependencies and applying security patches promptly is critical. Security teams should also educate developers and operators about the risks of injection vulnerabilities in expression evaluation engines and enforce secure coding practices to prevent similar issues.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T16:42:54.308Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693effcdb0f1e1d53011dae4

Added to database: 12/14/2025, 6:19:57 PM

Last enriched: 12/14/2025, 6:35:17 PM

Last updated: 12/15/2025, 5:51:16 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats