CVE-2025-57773

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-57773
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-57773.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-57773
Aliases
  • GHSA-7r8j-6whv-4j5p
Published
2025-08-25T16:42:11Z
Modified
2025-11-09T19:57:14.614793Z
Severity
  • 8.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Dataease DB2 Aspectweaver Deserialization Arbitrary File Write Vulnerability
Details

DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.12, because DB2 parameters are not filtered, a JNDI injection attack can be directly launched. JNDI triggers an AspectJWeaver deserialization attack, writing to various files. This vulnerability requires commons-collections 4.x and aspectjweaver-1.9.22.jar. The vulnerability has been fixed in version 2.10.12.

Database specific
{
    "cwe_ids": [
        "CWE-502",
        "CWE-94"
    ]
}
References

Affected packages

Git / github.com/dataease/dataease

Affected ranges

Type
GIT
Repo
https://github.com/dataease/dataease
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.0.0-rc1
v1.0.0-rc2
v1.11.0
v1.11.1
v1.2.0
v1.3.0
v1.5.0
v1.5.1
v1.5.2
v1.6.0
v1.8.0
v1.9.0

v2.*

v2.10.0
v2.10.1
v2.10.10
v2.10.11
v2.10.2
v2.10.3
v2.10.4
v2.10.5
v2.10.6
v2.10.7
v2.10.8
v2.10.9
v2.2.0
v2.3.0
v2.4.0
v2.6.0
v2.9.0