Vulnerabilities
Vulnerable Software
Ruoyi:  >> Ruoyi  Security Vulnerabilities
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the add method of the /add/{parentId} endpoint does not properly validate whether the requesting user has permission to add a menu item under the specified parentId
CVSS Score
8.8
EPSS Score
0.002
Published
2025-04-07
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the cancelAuthUserAll method does not properly validate whether the requesting user has administrative privileges
CVSS Score
9.8
EPSS Score
0.002
Published
2025-04-07
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the editSave method in /tool/gen/editSave
CVSS Score
9.8
EPSS Score
0.002
Published
2025-04-07
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the /editSave method in SysNoticeController
CVSS Score
9.8
EPSS Score
0.002
Published
2025-04-07
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the SysDictTypeController component
CVSS Score
9.8
EPSS Score
0.002
Published
2025-04-07
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the postID parameter in the edit method
CVSS Score
6.7
EPSS Score
0.001
Published
2025-04-07
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the menuId parameter
CVSS Score
6.7
EPSS Score
0.001
Published
2025-04-07
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the jobId parameter
CVSS Score
9.8
EPSS Score
0.002
Published
2025-04-07
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the editSave method does not properly validate whether the requesting user has administrative privileges before allowing modifications to system configuration settings
CVSS Score
7.2
EPSS Score
0.002
Published
2025-04-07
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the changeStatus method
CVSS Score
9.8
EPSS Score
0.002
Published
2025-04-07


Contact Us

Shodan ® - All rights reserved