CVE-2025-66916

The snailjob component in RuoYi-Vue-Plus versions 5.5.1 and earlier, interface /snail-job/workflow/check-node-expression can execute QLExpress expressions, but it does not filter user input, allowing attackers to use the File class to perform arbitrary file reading and writing.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dromara:ruoyi-vue-plus:*:*:*:*:*:*:*:*

History

30 Jan 2026, 01:05

Type Values Removed Values Added
References () https://gist.github.com/Catherines77/e3f06b9c4cc6298579e858088a243c3d - () https://gist.github.com/Catherines77/e3f06b9c4cc6298579e858088a243c3d - Third Party Advisory
References () https://gitee.com/dromara/RuoYi-Vue-Plus - () https://gitee.com/dromara/RuoYi-Vue-Plus - Product
References () https://github.com/Catherines77/code-au/blob/main/ruoyi-vue-plus/QLExpress.md - () https://github.com/Catherines77/code-au/blob/main/ruoyi-vue-plus/QLExpress.md - Exploit, Third Party Advisory
CPE cpe:2.3:a:dromara:ruoyi-vue-plus:*:*:*:*:*:*:*:*
First Time Dromara
Dromara ruoyi-vue-plus

08 Jan 2026, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-08 20:15

Updated : 2026-01-30 01:05


NVD link : CVE-2025-66916

Mitre link : CVE-2025-66916

CVE.ORG link : CVE-2025-66916


JSON object : View

Products Affected

dromara

  • ruoyi-vue-plus
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')