CVE-2025-63721

HummerRisk thru v1.5.0 is using a vulnerable Snakeyaml component, allowing attackers with normal user privileges to hit the /rule/add API and thereby achieve RCE and take over the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hummerrisk:hummerrisk:*:*:*:*:*:*:*:*

History

11 Dec 2025, 15:15

Type Values Removed Values Added
CWE CWE-502
References () https://gist.github.com/k1ng0fic3/e8c8c9353fff8fa95e2c2952587e9266 - Exploit, Third Party Advisory () https://gist.github.com/k1ng0fic3/e8c8c9353fff8fa95e2c2952587e9266 - Exploit, Third Party Advisory
References () https://github.com/k1ng0fic3/secrisk/blob/main/README.md - Exploit, Third Party Advisory () https://github.com/k1ng0fic3/secrisk/blob/main/README.md - Exploit, Third Party Advisory

11 Dec 2025, 00:05

Type Values Removed Values Added
References () https://gist.github.com/k1ng0fic3/e8c8c9353fff8fa95e2c2952587e9266 - () https://gist.github.com/k1ng0fic3/e8c8c9353fff8fa95e2c2952587e9266 - Exploit, Third Party Advisory
References () https://github.com/k1ng0fic3/secrisk/blob/main/README.md - () https://github.com/k1ng0fic3/secrisk/blob/main/README.md - Exploit, Third Party Advisory
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:hummerrisk:hummerrisk:*:*:*:*:*:*:*:*
First Time Hummerrisk hummerrisk
Hummerrisk

09 Dec 2025, 16:18

Type Values Removed Values Added
Summary (en) HummerRisk thru v1.5.0 is using a vulnerable Snakeyaml component allowing attackers to achieve RCE and take over the server. (en) HummerRisk thru v1.5.0 is using a vulnerable Snakeyaml component, allowing attackers with normal user privileges to hit the /rule/add API and thereby achieve RCE and take over the server.

08 Dec 2025, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-08 17:16

Updated : 2025-12-11 15:15


NVD link : CVE-2025-63721

Mitre link : CVE-2025-63721

CVE.ORG link : CVE-2025-63721


JSON object : View

Products Affected

hummerrisk

  • hummerrisk
CWE
NVD-CWE-noinfo CWE-502

Deserialization of Untrusted Data