We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in yangzongzhuan RuoYi up to 4.8.1. Affected by this vulnerability is the function Edit of the file /system/notice/edit. The manipulation of the argument noticeTitle/noticeContent leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Das betrifft die Funktion Edit der Datei /system/notice/edit. Durch das Manipulieren des Arguments noticeTitle/noticeContent mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
2025-08-10: | Advisory disclosed |
2025-08-10: | VulDB entry created |
2025-08-10: | VulDB entry last update |
ez-lbz (VulDB User)
vuldb.com/?id.319381 (VDB-319381 | yangzongzhuan RuoYi edit cross site scripting)
vuldb.com/?ctiid.319381 (VDB-319381 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.623372 (Submit #623372 | yangzongzhuan RuoYi <=4.8.1 cross site scripting)
github.com/yangzongzhuan/RuoYi/issues/298
github.com/yangzongzhuan/RuoYi/issues/298
Support options