CVE-2024-57521
Published: 23 December 2025
Summary
CVE-2024-57521 is a critical-severity SQL Injection (CWE-89) vulnerability in Ruoyi Ruoyi. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 32.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Information input validation directly and comprehensively prevents SQL injection by validating and sanitizing untrusted inputs to the createTable function in SqlUtil.java.
Flaw remediation addresses the vulnerability by requiring identification, prioritization, and patching of the SQL injection issue in RuoYi v4.7.9 and earlier.
Vulnerability monitoring and scanning detects the SQL injection flaw (CWE-89) in the createTable function, enabling timely remediation before exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2024-57521 is a SQL injection vulnerability in a public-facing web application (RuoYi framework) allowing unauthenticated remote arbitrary code execution, directly mapping to exploitation of public-facing applications.
NVD Description
SQL Injection vulnerability in RuoYi v.4.7.9 and before allows a remote attacker to execute arbitrary code via the createTable function in SqlUtil.java.
Deeper analysisAI
CVE-2024-57521 is a SQL injection vulnerability (CWE-89) affecting RuoYi versions 4.7.9 and earlier. The issue exists in the createTable function within SqlUtil.java, where a remote attacker can inject malicious SQL payloads to execute arbitrary code. Published on 2025-12-23, it carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), marking it as critically severe due to its potential for full system compromise.
Any unauthenticated remote attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation grants arbitrary code execution, enabling attackers to achieve high-impact confidentiality breaches, integrity modifications, and availability disruptions, with scope expanded beyond the vulnerable component.
Advisories point to a patch in the commit at https://gitee.com/y_project/RuoYi/commit/ddd858ca732618a472b10eaab2f8e4b45812ffc5, and an associated issue is tracked at https://gitee.com/y_project/RuoYi/issues/IBC976. Public proof-of-concept exploits are available at https://github.com/mrlihd/Ruoyi-4.7.9-SQL-Injection-PoC and https://github.com/mrlihd/CVE-2024-57521-SQL-Injection-PoC/blob/main/README.md, underscoring the urgency for affected users to update immediately.
Details
- CWE(s)