Cyber Posture

CVE-2022-31764

High

Published: 06 February 2025

Published
06 February 2025
Modified
16 July 2025
KEV Added
Patch
CVSS Score 8.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0013 31.8th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2022-31764 is a high-severity Improper Control of Dynamically-Managed Code Resources (CWE-913) vulnerability in Apache Shardingsphere Elasticjob-Ui. Its CVSS base score is 8.5 (High).

Operationally, ranked at the 31.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the RCE vulnerability by requiring timely identification, reporting, and patching to ElasticJob-UI 3.0.2 or later.

prevent

Prevents RCE exploitation by enforcing validation of untrusted Lite UI inputs, such as malicious H2 JDBC URLs that trigger dynamic code execution.

detect

Detects the vulnerable ElasticJob-UI version through vulnerability scanning, enabling prioritization of remediation for CVE-2022-31764.

NVD Description

The Lite UI of Apache ShardingSphere ElasticJob-UI allows an attacker to perform RCE by constructing a special JDBC URL of H2 database. This issue affects Apache ShardingSphere ElasticJob-UI version 3.0.1 and prior versions. This vulnerability has been fixed in ElasticJob-UI…

more

3.0.2. The premise of this attack is that the attacker has obtained the account and password. Otherwise, the attacker cannot perform this attack.

Deeper analysisAI

CVE-2022-31764 is a remote code execution (RCE) vulnerability in the Lite UI component of Apache ShardingSphere ElasticJob-UI. It allows an attacker to execute arbitrary code by crafting a malicious JDBC URL for the H2 database. The issue affects ElasticJob-UI version 3.0.1 and all prior versions, with a CVSS v3.1 base score of 8.5 (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) and is associated with CWE-913 (Improper Control of Dynamically-Managed Code Resources).

An attacker with low-privileged (PR:L) access, such as valid account credentials to the Lite UI, can exploit this over the network (AV:N) despite high attack complexity (AC:H) and without user interaction (UI:N). Successful exploitation grants scope-changed (S:C) high-impact confidentiality, integrity, and availability (C:I:A:H), enabling full RCE on the server. The attack requires prior obtainment of account and password credentials.

Apache advisories confirm the vulnerability has been fixed in ElasticJob-UI version 3.0.2. Security practitioners should upgrade to this version for mitigation. Additional details are available in the official Apache mailing list announcement at https://lists.apache.org/thread/pg0k223m4hsnnzg4nh7lxvdxxgbkrlqb.

Details

CWE(s)

Affected Products

apache
shardingsphere elasticjob-ui
≤ 3.0.2

CVEs Like This One

CVE-2025-69219Same vendor: Apache
CVE-2024-55532Same vendor: Apache
CVE-2025-66524Same vendor: Apache
CVE-2026-24308Same vendor: Apache
CVE-2026-30911Same vendor: Apache
CVE-2026-41602Same vendor: Apache
CVE-2025-62188Same vendor: Apache
CVE-2026-40010Same vendor: Apache
CVE-2026-39816Same vendor: Apache
CVE-2026-31908Same vendor: Apache

References