Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3f8c-8h8v-p54h | snail-job is vulnerable to Code Injection through QLExpressEngine.doEval function |
Tue, 24 Feb 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:aizuda:snail-job:*:*:*:*:*:*:*:* | |
| References |
|
Mon, 15 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aizuda
Aizuda snail-job |
|
| Vendors & Products |
Aizuda
Aizuda snail-job |
Sun, 14 Dec 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in aizuda snail-job up to 1.6.0. Affected by this vulnerability is the function QLExpressEngine.doEval of the file snail-job-common/snail-job-common-core/src/main/java/com/aizuda/snailjob/common/core/expression/strategy/QLExpressEngine.java. The manipulation results in injection. The attack can be launched remotely. Upgrading to version 1.7.0-beta1 addresses this issue. The patch is identified as 978f316c38b3d68bb74d2489b5e5f721f6675e86. The affected component should be upgraded. | |
| Title | aizuda snail-job QLExpressEngine.java QLExpressEngine.doEval injection | |
| Weaknesses | CWE-707 CWE-74 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-24T05:52:05.136Z
Reserved: 2025-12-13T16:42:54.308Z
Link: CVE-2025-14674
Updated: 2025-12-15T19:43:12.038Z
Status : Deferred
Published: 2025-12-14T18:15:43.977
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-14674
No data.
OpenCVE Enrichment
Updated: 2025-12-15T14:06:06Z
Github GHSA