Home

Description

DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.12, because DB2 parameters are not filtered, a JNDI injection attack can be directly launched. JNDI triggers an AspectJWeaver deserialization attack, writing to various files. This vulnerability requires commons-collections 4.x and aspectjweaver-1.9.22.jar. The vulnerability has been fixed in version 2.10.12.

PUBLISHED Reserved 2025-08-19 | Published 2025-08-25 | Updated 2025-08-25 | Assigner GitHub_M




HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-502: Deserialization of Untrusted Data

CWE-94: Improper Control of Generation of Code ('Code Injection')

Product status

< 2.10.12
affected

References

github.com/...taease/security/advisories/GHSA-7r8j-6whv-4j5p

github.com/...ommit/8d04e92d44e1bac9284e9e64df5afd7f96d9373c

cve.org (CVE-2025-57773)

nvd.nist.gov (CVE-2025-57773)

Download JSON