CVE-2025-15246
Unknown Unknown - Not Provided
Deserialization Vulnerability in aizuda Snail-Job API Enables Remote Exploit

Publication date: 2025-12-30

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was determined in aizuda snail-job up to 1.7.0 on macOS. Affected by this vulnerability is the function FurySerializer.deserialize of the component API. This manipulation of the argument argsStr causes deserialization. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-30
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
aizuda snail-job *
aizuda snail-job 1.7.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-502 The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-15246 is a critical deserialization vulnerability in the aizuda snail-job software (version 1.7.0 and earlier) on macOS. It occurs in the API component's FurySerializer.deserialize function, where the argument argsStr is deserialized without proper validation. This unsafe deserialization allows remote attackers to supply crafted malicious serialized data that can trigger remote code execution (RCE) by exploiting gadget chains. The deserialization framework is configured insecurely, disabling class registration and lacking whitelist filtering, which makes it possible to deserialize arbitrary classes and execute arbitrary commands on the server. [1, 2]


How can this vulnerability impact me? :

This vulnerability can lead to remote code execution on the server running aizuda snail-job, allowing attackers to execute arbitrary commands with the privileges of the application. This compromises the confidentiality, integrity, and availability of the affected system. Since the exploit is remotely accessible and easy to perform with publicly available proof-of-concept code, it poses a significant security risk. There are currently no effective mitigations, so affected users should consider replacing the product or applying strict input validation and class registration controls. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can focus on monitoring API endpoints such as /retry/dispatch, /retry/callback, and /retry/deserialize for suspicious or unexpected serialized input parameters (argsStr). Since the vulnerability involves unsafe deserialization of Base64-encoded and compressed data, you can look for unusual Base64 strings in network traffic or logs targeting these endpoints. Additionally, monitoring for unexpected remote code execution behaviors or anomalies in the SnailJob service logs may help. Specific commands are not provided in the resources, but network traffic capture tools (e.g., tcpdump, Wireshark) combined with searching for Base64 payloads in HTTP requests to these endpoints could be used. Also, inspecting logs for calls to FurySerializer.deserialize or unusual process executions may assist detection. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Avoid using affected versions of aizuda snail-job (versions up to 1.7.0) and consider replacing the product with an alternative. 2) If continuing to use the product, configure the Fury serializer to explicitly register all allowed classes and enable class checking by using ClassResolver#setClassChecker to restrict deserialization to safe class prefixes. 3) Do not disable class registration (avoid requireClassRegistration(false)) unless in a fully trusted environment. 4) Implement strict input validation and authentication on all API endpoints that accept serialized data, such as /retry/dispatch, /retry/callback, and /retry/deserialize. Since no effective countermeasures or patches are currently known, these steps are critical to reduce risk. [1, 2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows remote code execution through unsafe deserialization, impacting the confidentiality, integrity, and availability of the system. This could lead to unauthorized access or manipulation of sensitive data, which may result in non-compliance with standards and regulations such as GDPR and HIPAA that require protection of personal and sensitive information. However, no specific compliance impacts or regulatory references are explicitly detailed in the provided resources. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart