{"vulnerability": "CVE-2025-2622", "sightings": [{"uuid": "48d60df7-fc57-4bfa-8929-c7a51a20b51f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2622", "type": "seen", "source": "https://t.me/cvedetector/20880", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2622 - \"Aizuda Snail-Job Remote Deserialization Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2025-2622 \nPublished : March 22, 2025, 5:15 p.m. | 2\u00a0hours, 15\u00a0minutes ago \nDescription : A vulnerability was found in aizuda snail-job 1.4.0. It has been classified as critical. Affected is the function getRuntime of the file /snail-job/workflow/check-node-expression of the component Workflow-Task Management Module. The manipulation of the argument nodeExpression leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-22T21:14:42.000000Z"}, {"uuid": "cb29d6bc-dccb-4050-8da9-e6c3023d2103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2622", "type": "seen", "source": "https://gist.github.com/Liyw979/5f9fe6121ac99c7be2f2359c9259bb63", "content": "", "creation_timestamp": "2025-12-11T09:24:49.000000Z"}, {"uuid": "995cbc0e-ba55-4b1e-b361-4521cd3f2691", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2622", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkybpojeou26", "content": "", "creation_timestamp": "2025-03-22T17:44:16.142889Z"}]}