Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 30 Jan 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:dromara:ruoyi-vue-plus:*:*:*:*:*:*:*:* |
Fri, 09 Jan 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dromara
Dromara ruoyi-vue-plus |
|
| Vendors & Products |
Dromara
Dromara ruoyi-vue-plus |
Thu, 08 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Thu, 08 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The snailjob component in RuoYi-Vue-Plus versions 5.5.1 and earlier, interface /snail-job/workflow/check-node-expression can execute QLExpress expressions, but it does not filter user input, allowing attackers to use the File class to perform arbitrary file reading and writing. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-08T19:53:34.562Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-66916
Updated: 2026-01-08T19:53:02.486Z
Status : Analyzed
Published: 2026-01-08T20:15:44.657
Modified: 2026-01-30T01:05:34.193
Link: CVE-2025-66916
No data.
OpenCVE Enrichment
Updated: 2026-01-09T13:24:42Z