Cyber Posture

CVE-2024-57521

CriticalPublic PoC

Published: 23 December 2025

Published
23 December 2025
Modified
06 January 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0053 67.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

SQL Injection vulnerability in RuoYi v.4.7.9 and before allows a remote attacker to execute arbitrary code via the createTable function in SqlUtil.java.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Information input validation directly and comprehensively prevents SQL injection by validating and sanitizing untrusted inputs to the createTable function in SqlUtil.java.

prevent

Flaw remediation addresses the vulnerability by requiring identification, prioritization, and patching of the SQL injection issue in RuoYi v4.7.9 and earlier.

detect

Vulnerability monitoring and scanning detects the SQL injection flaw (CWE-89) in the createTable function, enabling timely remediation before exploitation.

Security SummaryAI

CVE-2024-57521 is a SQL injection vulnerability (CWE-89) affecting RuoYi versions 4.7.9 and earlier. The issue exists in the createTable function within SqlUtil.java, where a remote attacker can inject malicious SQL payloads to execute arbitrary code. Published on 2025-12-23, it carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), marking it as critically severe due to its potential for full system compromise.

Any unauthenticated remote attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation grants arbitrary code execution, enabling attackers to achieve high-impact confidentiality breaches, integrity modifications, and availability disruptions, with scope expanded beyond the vulnerable component.

Advisories point to a patch in the commit at https://gitee.com/y_project/RuoYi/commit/ddd858ca732618a472b10eaab2f8e4b45812ffc5, and an associated issue is tracked at https://gitee.com/y_project/RuoYi/issues/IBC976. Public proof-of-concept exploits are available at https://github.com/mrlihd/Ruoyi-4.7.9-SQL-Injection-PoC and https://github.com/mrlihd/CVE-2024-57521-SQL-Injection-PoC/blob/main/README.md, underscoring the urgency for affected users to update immediately.

Details

CWE(s)

Affected Products

ruoyi
ruoyi
≤ 4.7.9

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2024-57521 is a SQL injection vulnerability in a public-facing web application (RuoYi framework) allowing unauthenticated remote arbitrary code execution, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References