Cyber Posture

CVE-2024-57521

CriticalPublic PoC

Published: 23 December 2025

Published
23 December 2025
Modified
06 January 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0053 67.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-57521 is a critical-severity SQL Injection (CWE-89) vulnerability in Ruoyi Ruoyi. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 32.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Information input validation directly and comprehensively prevents SQL injection by validating and sanitizing untrusted inputs to the createTable function in SqlUtil.java.

prevent

Flaw remediation addresses the vulnerability by requiring identification, prioritization, and patching of the SQL injection issue in RuoYi v4.7.9 and earlier.

detect

Vulnerability monitoring and scanning detects the SQL injection flaw (CWE-89) in the createTable function, enabling timely remediation before exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

CVE-2024-57521 is a SQL injection vulnerability in a public-facing web application (RuoYi framework) allowing unauthenticated remote arbitrary code execution, directly mapping to exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

SQL Injection vulnerability in RuoYi v.4.7.9 and before allows a remote attacker to execute arbitrary code via the createTable function in SqlUtil.java.

Deeper analysisAI

CVE-2024-57521 is a SQL injection vulnerability (CWE-89) affecting RuoYi versions 4.7.9 and earlier. The issue exists in the createTable function within SqlUtil.java, where a remote attacker can inject malicious SQL payloads to execute arbitrary code. Published on 2025-12-23, it carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), marking it as critically severe due to its potential for full system compromise.

Any unauthenticated remote attacker can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation grants arbitrary code execution, enabling attackers to achieve high-impact confidentiality breaches, integrity modifications, and availability disruptions, with scope expanded beyond the vulnerable component.

Advisories point to a patch in the commit at https://gitee.com/y_project/RuoYi/commit/ddd858ca732618a472b10eaab2f8e4b45812ffc5, and an associated issue is tracked at https://gitee.com/y_project/RuoYi/issues/IBC976. Public proof-of-concept exploits are available at https://github.com/mrlihd/Ruoyi-4.7.9-SQL-Injection-PoC and https://github.com/mrlihd/CVE-2024-57521-SQL-Injection-PoC/blob/main/README.md, underscoring the urgency for affected users to update immediately.

Details

CWE(s)

Affected Products

ruoyi
ruoyi
≤ 4.7.9

CVEs Like This One

CVE-2025-70986Same product: Ruoyi Ruoyi
CVE-2025-70985Same product: Ruoyi Ruoyi
CVE-2025-0734Same product: Ruoyi Ruoyi
CVE-2024-57436Same product: Ruoyi Ruoyi
CVE-2025-69213Shared CWE-89
CVE-2025-52577Shared CWE-89
CVE-2026-41490Shared CWE-89
CVE-2026-35168Shared CWE-89
CVE-2025-22350Shared CWE-89
CVE-2025-68865Shared CWE-89

References