
Cloud Vulnerability DB
A community-led vulnerabilities database
SQL injection vulnerability discovered in vipshop Saturn version 3.5.1 and earlier versions, identified as CVE-2025-29085. The vulnerability was disclosed on April 2, 2025, affecting the Saturn application's dashboard component. This security flaw allows remote attackers to execute arbitrary code through the /console/dashboard/executorCount?zkClusterKey component (NVD).
The vulnerability exists in the DashboardController class of Saturn's console component. The executorCount method, which handles GET requests to /console/dashboard/executorCount, accepts an unvalidated zkClusterKey parameter. This parameter is directly concatenated into SQL queries within the getExecutorHistory method, leading to SQL injection possibilities. The vulnerability has received a CVSS v3.1 base score of 9.8 (CRITICAL) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating high severity with potential for complete system compromise (NVD, GitHub POC).
The SQL injection vulnerability allows remote attackers to execute arbitrary code, potentially leading to complete system compromise. The critical CVSS score of 9.8 indicates severe potential impact on system confidentiality, integrity, and availability (NVD).
Users should upgrade to a version newer than Saturn v3.5.1 once available. No official patch or workaround has been published at the time of this report.
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."