- Description
- An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the edit method of the /edit/{dictId} endpoint does not properly validate whether the requesting user has permission to modify the specified dictId
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-284
- Hype score
- Not currently trending
🚨 CVE-2025-28407 ❓ 🏢 Unknown Vendor - Unknown Product 🏗️ Unknown Version 🔗 https://t.co/WaPE4vFdcQ 🔗 https://t.co/prI3w3WBRY #CyberCron #VulnAlert #InfoSec https://t.co/dmVA9nQBFU
@cybercronai
7 Apr 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-28407 An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the edit method of the /edit/{dictId} endpoint does not properly validate whether the re… https://t.co/MEIhc30bd2
@CVEnew
7 Apr 2025
235 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ruoyi:ruoyi:4.8.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1248589F-5F63-4535-B2C9-EBBA85EA6D83"
}
],
"operator": "OR"
}
]
}
]