Description
An issue was discovered in RuoYi v4.5.1, allows attackers to obtain sensitive information via the status parameter.
Published: 2024-04-12
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00057}

epss

{'score': 0.0009}


Wed, 14 May 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Ruoyi
Ruoyi ruoyi
CPEs cpe:2.3:a:ruoyi:ruoyi:4.5.1:*:*:*:*:*:*:*
Vendors & Products Ruoyi
Ruoyi ruoyi

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-02T01:10:55.371Z

Reserved: 2024-03-19T00:00:00.000Z

Link: CVE-2024-29400

cve-icon Vulnrichment

Updated: 2024-08-02T01:10:55.371Z

cve-icon NVD

Status : Analyzed

Published: 2024-04-12T07:15:08.667

Modified: 2025-05-14T17:50:52.600

Link: CVE-2024-29400

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses