Description
A security vulnerability has been detected in y_project RuoYi up to 4.8.1. The affected element is an unknown function of the file /monitor/cache/getnames. Such manipulation of the argument fragment leads to code injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
Problem types
Product status
4.8.1
Timeline
| 2025-12-17: | Advisory disclosed |
| 2025-12-17: | VulDB entry created |
| 2025-12-17: | VulDB entry last update |
Credits
Customer (VulDB User)
References
vuldb.com/?id.337047 (VDB-337047 | y_project RuoYi getnames code injection)
vuldb.com/?ctiid.337047 (VDB-337047 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.710152 (Submit #710152 | Ruoyi Management System V4.8.1 Code Injection)
github.com/ltranquility/CVE/issues/26
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.