CVE-2025-7788
Published: 18 July 2025
Summary
CVE-2025-7788 is a medium-severity Command Injection (CWE-77) vulnerability in Xuxueli Xxl-Job. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Command and Scripting Interpreter (T1059); ranked in the top 26.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in remotely accessible xxl-job executor enables exploitation of public-facing applications (T1190), indirect command execution via the vulnerable handler (T1202), and adversary use of command and scripting interpreters (T1059).
NVD Description
A vulnerability has been found in Xuxueli xxl-job up to 3.1.1 and classified as critical. Affected by this vulnerability is the function commandJobHandler of the file src\main\java\com\xxl\job\executor\service\jobhandler\SampleXxlJob.java. The manipulation leads to os command injection. The attack can be launched remotely.…
more
The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2025-7788 is a critical OS command injection vulnerability in Xuxueli xxl-job versions up to 3.1.1. The flaw affects the commandJobHandler function in the file src/main/java/com/xxl/job/executor/service/jobhandler/SampleXxlJob.java, where manipulation enables arbitrary OS command execution. Published on 2025-07-18, it carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and maps to CWE-77 (Command Injection) and CWE-78 (OS Command Injection).
The vulnerability is exploitable remotely by authenticated attackers with low privileges over the network, with low complexity and no user interaction required. Exploitation allows limited impacts on confidentiality, integrity, and availability, potentially enabling command execution within the context of the affected job handler.
Advisories detail the issue in the project's GitHub repository at https://github.com/xuxueli/xxl-job/issues/3750 and VulDB entries at https://vuldb.com/?ctiid.316849, https://vuldb.com/?id.316849, and https://vuldb.com/?submit.615758. The exploit has been publicly disclosed and may be actively used.
The public availability of the exploit underscores the need for immediate patching or disabling of the vulnerable SampleXxlJob handler in affected deployments.
Details
- CWE(s)