CVE-2025-66916
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Lifecycle Timeline
3Description
The snailjob component in RuoYi-Vue-Plus versions 5.5.1 and earlier, interface /snail-job/workflow/check-node-expression can execute QLExpress expressions, but it does not filter user input, allowing attackers to use the File class to perform arbitrary file reading and writing.
Analysis
RuoYi-Vue-Plus (through 5.5.1) allows arbitrary file read/write through QLExpress expression evaluation in the snailjob workflow node checker. Attackers can use the File class to access any file on the server. PoC available.
Technical Context
The /snail-job/workflow/check-node-expression endpoint evaluates QLExpress expressions without filtering dangerous classes (CWE-94). Attackers can use java.io.File and related classes to read sensitive files (application.yml, database credentials) or write malicious files.
Affected Products
RuoYi-Vue-Plus through 5.5.1
Remediation
Update RuoYi-Vue-Plus. Implement expression sandboxing that blocks File, Runtime, Process, and other dangerous classes.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today