CVE-2025-70828

An issue in Datart v1.0.0-rc.3 allows attackers to execute arbitrary code via the url parameter in the JDBC configuration
Configurations

Configuration 1 (hide)

cpe:2.3:a:running-elephant:datart:1.0.0:rc3:*:*:*:*:*:*

History

03 Apr 2026, 11:33

Type Values Removed Values Added
First Time Running-elephant
Running-elephant datart
References () https://dev.mysql.com/doc/connector-j/en/connector-j-connprops-interceptor-classes-and-interfaces.html - () https://dev.mysql.com/doc/connector-j/en/connector-j-connprops-interceptor-classes-and-interfaces.html - Broken Link
References () https://github.com/xiaoxiaoranxxx/CVE-2025-70828 - () https://github.com/xiaoxiaoranxxx/CVE-2025-70828 - Exploit, Third Party Advisory
CPE cpe:2.3:a:running-elephant:datart:1.0.0:rc3:*:*:*:*:*:*

18 Feb 2026, 17:52

Type Values Removed Values Added
Summary
  • (es) Un problema en Datart v1.0.0-rc.3 permite a los atacantes ejecutar código arbitrario a través del parámetro url en la configuración JDBC.

17 Feb 2026, 17:21

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CWE CWE-78

17 Feb 2026, 16:20

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-17 16:20

Updated : 2026-04-03 11:33


NVD link : CVE-2025-70828

Mitre link : CVE-2025-70828

CVE.ORG link : CVE-2025-70828


JSON object : View

Products Affected

running-elephant

  • datart
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')