Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-31012 | Datart 1.0.0-rc.3 is vulnerable to Directory Traversal. The configuration file handling of the application allows attackers to upload arbitrary YAML files to the config/jdbc-driver-ext.yml path. The application parses this file using SnakeYAML's unsafe load() or loadAs() method without input sanitization. This allows deserialization of attacker-controlled YAML content, leading to arbitrary class instantiation. Under certain conditions, this can be exploited to achieve remote code execution (RCE). |
Fri, 10 Oct 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Running-elephant
Running-elephant datart |
|
| CPEs | cpe:2.3:a:running-elephant:datart:1.0.0:rc3:*:*:*:*:*:* | |
| Vendors & Products |
Running-elephant
Running-elephant datart |
Thu, 25 Sep 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Datart
Datart datart |
|
| Vendors & Products |
Datart
Datart datart |
Wed, 24 Sep 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 CWE-502 |
|
| Metrics |
cvssV3_1
|
Wed, 24 Sep 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Datart 1.0.0-rc.3 is vulnerable to Directory Traversal. The configuration file handling of the application allows attackers to upload arbitrary YAML files to the config/jdbc-driver-ext.yml path. The application parses this file using SnakeYAML's unsafe load() or loadAs() method without input sanitization. This allows deserialization of attacker-controlled YAML content, leading to arbitrary class instantiation. Under certain conditions, this can be exploited to achieve remote code execution (RCE). | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-24T17:18:26.606Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-56816
Updated: 2025-09-24T17:16:52.826Z
Status : Analyzed
Published: 2025-09-24T17:15:41.450
Modified: 2025-10-10T21:06:27.993
Link: CVE-2025-56816
No data.
OpenCVE Enrichment
Updated: 2025-09-25T08:22:03Z
EUVD