CVE-2025-14674: Injection in aizuda snail-job
A vulnerability was found in aizuda snail-job up to 1.6.0. Affected by this vulnerability is the function QLExpressEngine.doEval of the file snail-job-common/snail-job-common-core/src/main/java/com/aizuda/snailjob/common/core/expression/strategy/QLExpressEngine.java. The manipulation results in injection. The attack can be launched remotely. Upgrading to version 1.7.0-beta1 addresses this issue. The patch is identified as 978f316c38b3d68bb74d2489b5e5f721f6675e86. The affected component should be upgraded.
AI Analysis
Technical Summary
CVE-2025-14674 is an injection vulnerability identified in the aizuda snail-job product, a Java-based job scheduling and workflow automation tool. The flaw resides in the QLExpressEngine.doEval method within the snail-job-common-core module, which evaluates expressions. Improper input validation or sanitization in this function allows an attacker to inject malicious code or commands remotely. The vulnerability affects all versions up to 1.6.0. Exploitation does not require user interaction but does require low-level privileges, indicating that an attacker must have some authenticated access or limited permissions within the system. The injection could lead to unauthorized code execution or manipulation of job execution logic, potentially impacting confidentiality, integrity, and availability. The vulnerability was patched in version 1.7.0-beta1, with the fix identified by commit 978f316c38b3d68bb74d2489b5e5f721f6675e86. No public exploits are currently known, but the remote attack vector and lack of user interaction make this a notable risk for organizations relying on snail-job for critical automation tasks.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to those using aizuda snail-job for automating workflows, batch jobs, or scheduled tasks. Exploitation could allow attackers to inject malicious expressions that alter job execution, potentially leading to unauthorized data access, data corruption, or disruption of automated processes. This could impact business continuity, especially in sectors relying heavily on automation such as finance, manufacturing, and IT services. The partial compromise of confidentiality and integrity could expose sensitive operational data or intellectual property. Availability impacts could arise if injected code disrupts or halts scheduled jobs. Given the remote attack vector and no requirement for user interaction, attackers could exploit this vulnerability from outside the network if access controls are weak. However, the requirement for low privileges limits the attack surface to insiders or attackers who have already gained limited access.
Mitigation Recommendations
European organizations should immediately upgrade all affected aizuda snail-job instances to version 1.7.0-beta1 or later to apply the official patch. In addition, organizations should audit and restrict access controls to limit who can interact with the QLExpressEngine.doEval function or submit expressions for evaluation. Implement strict input validation and sanitization on any user-supplied data that interacts with the expression engine. Monitor logs for unusual or unauthorized expression evaluations that could indicate attempted exploitation. Employ network segmentation and firewall rules to restrict remote access to snail-job management interfaces. Conduct regular security assessments and penetration tests focused on injection vulnerabilities in automation tools. Finally, maintain an inventory of all automation tools and ensure timely patch management to reduce exposure to similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-14674: Injection in aizuda snail-job
Description
A vulnerability was found in aizuda snail-job up to 1.6.0. Affected by this vulnerability is the function QLExpressEngine.doEval of the file snail-job-common/snail-job-common-core/src/main/java/com/aizuda/snailjob/common/core/expression/strategy/QLExpressEngine.java. The manipulation results in injection. The attack can be launched remotely. Upgrading to version 1.7.0-beta1 addresses this issue. The patch is identified as 978f316c38b3d68bb74d2489b5e5f721f6675e86. The affected component should be upgraded.
AI-Powered Analysis
Technical Analysis
CVE-2025-14674 is an injection vulnerability identified in the aizuda snail-job product, a Java-based job scheduling and workflow automation tool. The flaw resides in the QLExpressEngine.doEval method within the snail-job-common-core module, which evaluates expressions. Improper input validation or sanitization in this function allows an attacker to inject malicious code or commands remotely. The vulnerability affects all versions up to 1.6.0. Exploitation does not require user interaction but does require low-level privileges, indicating that an attacker must have some authenticated access or limited permissions within the system. The injection could lead to unauthorized code execution or manipulation of job execution logic, potentially impacting confidentiality, integrity, and availability. The vulnerability was patched in version 1.7.0-beta1, with the fix identified by commit 978f316c38b3d68bb74d2489b5e5f721f6675e86. No public exploits are currently known, but the remote attack vector and lack of user interaction make this a notable risk for organizations relying on snail-job for critical automation tasks.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to those using aizuda snail-job for automating workflows, batch jobs, or scheduled tasks. Exploitation could allow attackers to inject malicious expressions that alter job execution, potentially leading to unauthorized data access, data corruption, or disruption of automated processes. This could impact business continuity, especially in sectors relying heavily on automation such as finance, manufacturing, and IT services. The partial compromise of confidentiality and integrity could expose sensitive operational data or intellectual property. Availability impacts could arise if injected code disrupts or halts scheduled jobs. Given the remote attack vector and no requirement for user interaction, attackers could exploit this vulnerability from outside the network if access controls are weak. However, the requirement for low privileges limits the attack surface to insiders or attackers who have already gained limited access.
Mitigation Recommendations
European organizations should immediately upgrade all affected aizuda snail-job instances to version 1.7.0-beta1 or later to apply the official patch. In addition, organizations should audit and restrict access controls to limit who can interact with the QLExpressEngine.doEval function or submit expressions for evaluation. Implement strict input validation and sanitization on any user-supplied data that interacts with the expression engine. Monitor logs for unusual or unauthorized expression evaluations that could indicate attempted exploitation. Employ network segmentation and firewall rules to restrict remote access to snail-job management interfaces. Conduct regular security assessments and penetration tests focused on injection vulnerabilities in automation tools. Finally, maintain an inventory of all automation tools and ensure timely patch management to reduce exposure to similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-13T16:42:54.308Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 693effcdb0f1e1d53011dae4
Added to database: 12/14/2025, 6:19:57 PM
Last enriched: 12/21/2025, 6:39:37 PM
Last updated: 2/7/2026, 12:51:39 AM
Views: 81
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.