CVE-2025-15246
Deserialization Vulnerability in aizuda Snail-Job API Enables Remote Exploit
Publication date: 2025-12-30
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| aizuda | snail-job | * |
| aizuda | snail-job | 1.7.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
| CWE-502 | The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-15246 is a critical deserialization vulnerability in the aizuda snail-job software (version 1.7.0 and earlier) on macOS. It occurs in the API component's FurySerializer.deserialize function, where the argument argsStr is deserialized without proper validation. This unsafe deserialization allows remote attackers to supply crafted malicious serialized data that can trigger remote code execution (RCE) by exploiting gadget chains. The deserialization framework is configured insecurely, disabling class registration and lacking whitelist filtering, which makes it possible to deserialize arbitrary classes and execute arbitrary commands on the server. [1, 2]
How can this vulnerability impact me? :
This vulnerability can lead to remote code execution on the server running aizuda snail-job, allowing attackers to execute arbitrary commands with the privileges of the application. This compromises the confidentiality, integrity, and availability of the affected system. Since the exploit is remotely accessible and easy to perform with publicly available proof-of-concept code, it poses a significant security risk. There are currently no effective mitigations, so affected users should consider replacing the product or applying strict input validation and class registration controls. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can focus on monitoring API endpoints such as /retry/dispatch, /retry/callback, and /retry/deserialize for suspicious or unexpected serialized input parameters (argsStr). Since the vulnerability involves unsafe deserialization of Base64-encoded and compressed data, you can look for unusual Base64 strings in network traffic or logs targeting these endpoints. Additionally, monitoring for unexpected remote code execution behaviors or anomalies in the SnailJob service logs may help. Specific commands are not provided in the resources, but network traffic capture tools (e.g., tcpdump, Wireshark) combined with searching for Base64 payloads in HTTP requests to these endpoints could be used. Also, inspecting logs for calls to FurySerializer.deserialize or unusual process executions may assist detection. [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1) Avoid using affected versions of aizuda snail-job (versions up to 1.7.0) and consider replacing the product with an alternative. 2) If continuing to use the product, configure the Fury serializer to explicitly register all allowed classes and enable class checking by using ClassResolver#setClassChecker to restrict deserialization to safe class prefixes. 3) Do not disable class registration (avoid requireClassRegistration(false)) unless in a fully trusted environment. 4) Implement strict input validation and authentication on all API endpoints that accept serialized data, such as /retry/dispatch, /retry/callback, and /retry/deserialize. Since no effective countermeasures or patches are currently known, these steps are critical to reduce risk. [1, 2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows remote code execution through unsafe deserialization, impacting the confidentiality, integrity, and availability of the system. This could lead to unauthorized access or manipulation of sensitive data, which may result in non-compliance with standards and regulations such as GDPR and HIPAA that require protection of personal and sensitive information. However, no specific compliance impacts or regulatory references are explicitly detailed in the provided resources. [1, 2]