CVE-2025-57773

DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.12, because DB2 parameters are not filtered, a JNDI injection attack can be directly launched. JNDI triggers an AspectJWeaver deserialization attack, writing to various files. This vulnerability requires commons-collections 4.x and aspectjweaver-1.9.22.jar. The vulnerability has been fixed in version 2.10.12.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*

History

03 Sep 2025, 13:43

Type Values Removed Values Added
References () https://github.com/dataease/dataease/commit/8d04e92d44e1bac9284e9e64df5afd7f96d9373c - () https://github.com/dataease/dataease/commit/8d04e92d44e1bac9284e9e64df5afd7f96d9373c - Patch
References () https://github.com/dataease/dataease/security/advisories/GHSA-7r8j-6whv-4j5p - () https://github.com/dataease/dataease/security/advisories/GHSA-7r8j-6whv-4j5p - Exploit, Third Party Advisory
CPE cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Dataease
Dataease dataease
Summary
  • (es) DataEase es una herramienta de código abierto para inteligencia empresarial y visualización de datos. Antes de la versión 2.10.12, dado que los parámetros de DB2 no se filtraban, se podía lanzar directamente un ataque de inyección JNDI. JNDI desencadena un ataque de deserialización de AspectJWeaver, escribiendo en varios archivos. Esta vulnerabilidad requiere commons-collections 4.x y aspectjweaver-1.9.22.jar. La vulnerabilidad se ha corregido en la versión 2.10.12.

25 Aug 2025, 20:24

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-25 17:15

Updated : 2025-09-03 13:43


NVD link : CVE-2025-57773

Mitre link : CVE-2025-57773

CVE.ORG link : CVE-2025-57773


JSON object : View

Products Affected

dataease

  • dataease
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-502

Deserialization of Untrusted Data