Cyber Posture

CVE-2025-56816

HighPublic PoCRCE

Published: 24 September 2025

Published
24 September 2025
Modified
10 October 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0201 83.9th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-56816 is a high-severity Path Traversal (CWE-22) vulnerability in Running-Elephant Datart. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 16.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the directory traversal and unsafe SnakeYAML deserialization flaw by identifying, reporting, and correcting the vulnerability to prevent arbitrary YAML uploads and RCE.

prevent

Enforces validation and sanitization of file upload paths and YAML content to block directory traversal to config/jdbc-driver-ext.yml and malicious deserialization payloads.

detect

Monitors the integrity of critical configuration files like jdbc-driver-ext.yml to detect unauthorized modifications from directory traversal exploits.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability involves directory traversal in a web application's file upload endpoint (/api/v1/files/viz/image), enabling attackers to overwrite the config/jdbc-driver-ext.yml file with malicious YAML. The unsafe SnakeYAML deserialization parses this content, allowing arbitrary class instantiation and potential RCE, which aligns with exploitation of a public-facing application.

NVD Description

Datart 1.0.0-rc.3 is vulnerable to Directory Traversal. The configuration file handling of the application allows attackers to upload arbitrary YAML files to the config/jdbc-driver-ext.yml path. The application parses this file using SnakeYAML's unsafe load() or loadAs() method without input sanitization.…

more

This allows deserialization of attacker-controlled YAML content, leading to arbitrary class instantiation. Under certain conditions, this can be exploited to achieve remote code execution (RCE).

Deeper analysisAI

Datart 1.0.0-rc.3 is vulnerable to a directory traversal flaw (CWE-22) in its configuration file handling, combined with unsafe deserialization (CWE-502). Attackers can upload arbitrary YAML files to the config/jdbc-driver-ext.yml path. The application parses these files using SnakeYAML's unsafe load() or loadAs() methods without input sanitization, enabling deserialization of attacker-controlled YAML content and arbitrary class instantiation. Under certain conditions, this leads to remote code execution (RCE).

The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating exploitation is possible over the network by unauthenticated attackers (PR:N) with low attack complexity (AC:L), though it requires user interaction (UI:R). Successful attacks can achieve high impacts on confidentiality, integrity, and availability, potentially resulting in RCE on the affected system.

References include the Datart GitHub repository at https://github.com/running-elephant/datart and a related repository at https://github.com/xiaoxiaoranxxx/CVE-2025-56815, which may contain additional details on advisories or patches for mitigation.

Details

CWE(s)

Affected Products

running-elephant
datart
1.0.0

CVEs Like This One

CVE-2025-56819Same product: Running-Elephant Datart
CVE-2025-70828Same product: Running-Elephant Datart
CVE-2025-67617Shared CWE-502
CVE-2026-23549Shared CWE-502
CVE-2026-27303Shared CWE-502
CVE-2023-49886Shared CWE-502
CVE-2025-61811Shared CWE-22
CVE-2024-52577Shared CWE-502
CVE-2025-51743Shared CWE-502
CVE-2025-62515Shared CWE-502

References