Vulnerability Description
All versions of the package com.bstek.uflo:uflo-core are vulnerable to Remote Code Execution (RCE) in the ExpressionContextImpl class via jexl.createExpression(expression).evaluate(context); functionality, due to improper user input validation.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Uflo Project | Uflo | All versions |
Related Weaknesses (CWE)
References
- https://fmyyy1.github.io/2022/10/23/uflo2rce/ExploitThird Party Advisory
- https://github.com/youseries/uflo/blob/b3e198bc6523e5a6ba69edd84ba10e05a3b78726/Broken Link
- https://security.snyk.io/vuln/SNYK-JAVA-COMBSTEKUFLO-3091112Third Party Advisory
- https://fmyyy1.github.io/2022/10/23/uflo2rce/ExploitThird Party Advisory
- https://github.com/youseries/uflo/blob/b3e198bc6523e5a6ba69edd84ba10e05a3b78726/Broken Link
- https://security.snyk.io/vuln/SNYK-JAVA-COMBSTEKUFLO-3091112Third Party Advisory
FAQ
What is CVE-2022-25894?
CVE-2022-25894 is a vulnerability with a CVSS score of 9.8 (CRITICAL). All versions of the package com.bstek.uflo:uflo-core are vulnerable to Remote Code Execution (RCE) in the ExpressionContextImpl class via jexl.createExpression(expression).evaluate(context); functiona...
How severe is CVE-2022-25894?
CVE-2022-25894 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-25894?
Check the references section above for vendor advisories and patch information. Affected products include: Uflo Project Uflo.