CVE-2025-10218: SQL Injection in lostvip-com ruoyi-go
A flaw has been found in lostvip-com ruoyi-go 2.1. This affects the function SelectListPage of the file modules/system/dao/SysRoleDao.go of the component Background Management Page. This manipulation of the argument sortName causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10218 is a medium severity SQL Injection vulnerability identified in version 2.1 of the ruoyi-go product developed by lostvip-com. The vulnerability exists in the SelectListPage function within the modules/system/dao/SysRoleDao.go file, specifically in the Background Management Page component. The flaw arises due to improper sanitization or validation of the 'sortName' argument, which is used directly in SQL queries. This allows an attacker to manipulate the SQL query logic remotely without requiring authentication or user interaction, potentially leading to unauthorized data access or modification. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting a network attack vector with low complexity and no privileges or user interaction required, but with limited impact on confidentiality, integrity, and availability. Although an exploit has been published, there are no known widespread exploits in the wild yet. The vendor was contacted but did not respond, and no official patches or mitigations have been released at this time. The vulnerability could be leveraged by attackers to perform unauthorized queries, extract sensitive data, or alter role management information within the affected system, which could facilitate further privilege escalation or lateral movement within an organization’s environment.
Potential Impact
For European organizations using ruoyi-go 2.1, this vulnerability poses a risk to the confidentiality and integrity of their role management data within the Background Management Page. Successful exploitation could allow attackers to retrieve sensitive information about user roles or permissions, potentially enabling privilege escalation or unauthorized access to critical systems. This could disrupt internal access controls and lead to data breaches or operational disruptions. Organizations in sectors with strict data protection regulations, such as finance, healthcare, or government, may face compliance risks and reputational damage if exploited. Although the impact on availability is limited, the compromise of role data could indirectly affect system stability or security posture. The lack of vendor response and absence of patches increases the urgency for organizations to implement compensating controls. Given the remote exploitability and no requirement for user interaction, threat actors could automate attacks against exposed instances, increasing the likelihood of exploitation if systems are internet-facing or insufficiently protected.
Mitigation Recommendations
Since no official patch or update is currently available from the vendor, European organizations should implement immediate compensating controls. These include: 1) Restricting network access to the ruoyi-go management interface by using firewalls, VPNs, or IP whitelisting to limit exposure to trusted administrators only. 2) Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection payloads targeting the 'sortName' parameter. 3) Conducting thorough input validation and sanitization on the 'sortName' parameter at the application or proxy level if possible. 4) Monitoring logs and network traffic for unusual query patterns or repeated access attempts to the vulnerable function. 5) Preparing for rapid patch deployment by tracking vendor updates or community patches and testing them in isolated environments before production rollout. 6) Reviewing and tightening role-based access controls to minimize the impact if role data is compromised. 7) Educating administrators about the vulnerability and encouraging vigilance against phishing or social engineering attempts that could leverage this flaw for lateral movement.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10218: SQL Injection in lostvip-com ruoyi-go
Description
A flaw has been found in lostvip-com ruoyi-go 2.1. This affects the function SelectListPage of the file modules/system/dao/SysRoleDao.go of the component Background Management Page. This manipulation of the argument sortName causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10218 is a medium severity SQL Injection vulnerability identified in version 2.1 of the ruoyi-go product developed by lostvip-com. The vulnerability exists in the SelectListPage function within the modules/system/dao/SysRoleDao.go file, specifically in the Background Management Page component. The flaw arises due to improper sanitization or validation of the 'sortName' argument, which is used directly in SQL queries. This allows an attacker to manipulate the SQL query logic remotely without requiring authentication or user interaction, potentially leading to unauthorized data access or modification. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting a network attack vector with low complexity and no privileges or user interaction required, but with limited impact on confidentiality, integrity, and availability. Although an exploit has been published, there are no known widespread exploits in the wild yet. The vendor was contacted but did not respond, and no official patches or mitigations have been released at this time. The vulnerability could be leveraged by attackers to perform unauthorized queries, extract sensitive data, or alter role management information within the affected system, which could facilitate further privilege escalation or lateral movement within an organization’s environment.
Potential Impact
For European organizations using ruoyi-go 2.1, this vulnerability poses a risk to the confidentiality and integrity of their role management data within the Background Management Page. Successful exploitation could allow attackers to retrieve sensitive information about user roles or permissions, potentially enabling privilege escalation or unauthorized access to critical systems. This could disrupt internal access controls and lead to data breaches or operational disruptions. Organizations in sectors with strict data protection regulations, such as finance, healthcare, or government, may face compliance risks and reputational damage if exploited. Although the impact on availability is limited, the compromise of role data could indirectly affect system stability or security posture. The lack of vendor response and absence of patches increases the urgency for organizations to implement compensating controls. Given the remote exploitability and no requirement for user interaction, threat actors could automate attacks against exposed instances, increasing the likelihood of exploitation if systems are internet-facing or insufficiently protected.
Mitigation Recommendations
Since no official patch or update is currently available from the vendor, European organizations should implement immediate compensating controls. These include: 1) Restricting network access to the ruoyi-go management interface by using firewalls, VPNs, or IP whitelisting to limit exposure to trusted administrators only. 2) Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection payloads targeting the 'sortName' parameter. 3) Conducting thorough input validation and sanitization on the 'sortName' parameter at the application or proxy level if possible. 4) Monitoring logs and network traffic for unusual query patterns or repeated access attempts to the vulnerable function. 5) Preparing for rapid patch deployment by tracking vendor updates or community patches and testing them in isolated environments before production rollout. 6) Reviewing and tightening role-based access controls to minimize the impact if role data is compromised. 7) Educating administrators about the vulnerability and encouraging vigilance against phishing or social engineering attempts that could leverage this flaw for lateral movement.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-10T11:35:51.947Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c1f18512193b50d300cefe
Added to database: 9/10/2025, 9:45:41 PM
Last enriched: 9/18/2025, 12:42:01 AM
Last updated: 10/30/2025, 8:26:22 AM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11906: CWE-732 Incorrect Permission Assignment for Critical Resource in Progress Software Flowmon
MediumCVE-2025-11881: CWE-862 Missing Authorization in scottopolis AppPresser – Mobile App Framework
MediumCVE-2025-62229: Use After Free in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-11627: CWE-117 Improper Output Neutralization for Logs in sminozzi Site Checkup Debug AI Troubleshooting with Wizard and Tips for Each Issue
MediumCVE-2025-10008: CWE-862 Missing Authorization in remyb92 Translate WordPress and go Multilingual – Weglot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.