Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-10358 | An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the add method of the /add/{parentId} endpoint does not properly validate whether the requesting user has permission to add a menu item under the specified parentId |
Wed, 09 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ruoyi
Ruoyi ruoyi |
|
| CPEs | cpe:2.3:a:ruoyi:ruoyi:4.8.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Ruoyi
Ruoyi ruoyi |
Tue, 08 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Mon, 07 Apr 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the add method of the /add/{parentId} endpoint does not properly validate whether the requesting user has permission to add a menu item under the specified parentId | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-08T19:33:50.083Z
Reserved: 2025-03-11T00:00:00.000Z
Link: CVE-2025-28409
Updated: 2025-04-08T19:33:44.576Z
Status : Analyzed
Published: 2025-04-07T16:15:25.057
Modified: 2025-04-09T18:59:55.370
Link: CVE-2025-28409
No data.
OpenCVE Enrichment
No data.
EUVD