Vulnerability Description
DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.12, because DB2 parameters are not filtered, a JNDI injection attack can be directly launched. JNDI triggers an AspectJWeaver deserialization attack, writing to various files. This vulnerability requires commons-collections 4.x and aspectjweaver-1.9.22.jar. The vulnerability has been fixed in version 2.10.12.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dataease | Dataease | < 2.10.12 |
Related Weaknesses (CWE)
References
- https://github.com/dataease/dataease/commit/8d04e92d44e1bac9284e9e64df5afd7f96d9Patch
- https://github.com/dataease/dataease/security/advisories/GHSA-7r8j-6whv-4j5pExploitThird Party Advisory
FAQ
What is CVE-2025-57773?
CVE-2025-57773 is a vulnerability with a CVSS score of 9.8 (CRITICAL). DataEase is an open source business intelligence and data visualization tool. Prior to version 2.10.12, because DB2 parameters are not filtered, a JNDI injection attack can be directly launched. JNDI ...
How severe is CVE-2025-57773?
CVE-2025-57773 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-57773?
Check the references section above for vendor advisories and patch information. Affected products include: Dataease Dataease.