CVE-2025-10218: SQL Injection in lostvip-com ruoyi-go
A flaw has been found in lostvip-com ruoyi-go 2.1. This affects the function SelectListPage of the file modules/system/dao/SysRoleDao.go of the component Background Management Page. This manipulation of the argument sortName causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10218 is a medium severity SQL Injection vulnerability identified in version 2.1 of the ruoyi-go software developed by lostvip-com. The vulnerability resides in the SelectListPage function within the modules/system/dao/SysRoleDao.go file, specifically in the Background Management Page component. The flaw arises due to improper sanitization or validation of the 'sortName' argument, which is directly used in SQL queries. This allows an attacker to manipulate the 'sortName' parameter to inject arbitrary SQL commands. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing its risk profile. Although the CVSS 4.0 base score is 5.3 (medium), the exploit has been published publicly, which raises the likelihood of exploitation. The vendor was contacted but did not respond or provide a patch, leaving affected systems exposed. The vulnerability impacts the confidentiality, integrity, and availability of the backend database, potentially allowing attackers to extract sensitive data, modify or delete records, or disrupt service availability. The lack of authentication requirement and remote exploitability make this a notable risk for organizations using ruoyi-go 2.1, especially those relying on the Background Management Page for role management and access control. The absence of vendor response and patches further exacerbates the threat landscape around this vulnerability.
Potential Impact
For European organizations using ruoyi-go 2.1, this SQL Injection vulnerability poses a significant risk to the security of their backend systems. Exploitation could lead to unauthorized data disclosure, including sensitive user or organizational information, which may violate GDPR and other data protection regulations. Integrity of role and permission data could be compromised, potentially allowing privilege escalation or unauthorized access to critical systems. Availability could also be affected if attackers execute destructive SQL commands or cause database corruption. Given the remote and unauthenticated nature of the exploit, attackers can launch attacks from anywhere, increasing the attack surface. Organizations in sectors with high regulatory scrutiny such as finance, healthcare, and government are particularly at risk due to the potential for data breaches and operational disruptions. The public availability of exploits and lack of vendor patches mean that attackers can readily target vulnerable systems, increasing the urgency for European entities to assess and mitigate this vulnerability promptly.
Mitigation Recommendations
1. Immediate mitigation should include implementing web application firewalls (WAFs) with custom rules to detect and block malicious SQL injection payloads targeting the 'sortName' parameter. 2. Conduct a thorough code review of the SelectListPage function and related database access code to implement proper input validation and parameterized queries or prepared statements to eliminate SQL injection vectors. 3. If possible, upgrade to a later, patched version of ruoyi-go once available; if no patch exists, consider disabling or restricting access to the affected Background Management Page component until a fix is released. 4. Employ network segmentation and strict access controls to limit exposure of the management interfaces to trusted internal networks only. 5. Monitor logs and network traffic for unusual query patterns or repeated attempts to exploit the 'sortName' parameter. 6. Develop an incident response plan specifically addressing SQL injection attacks, including data backup and recovery procedures to mitigate potential data loss or corruption. 7. Engage with the vendor or community to encourage patch development and share threat intelligence related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10218: SQL Injection in lostvip-com ruoyi-go
Description
A flaw has been found in lostvip-com ruoyi-go 2.1. This affects the function SelectListPage of the file modules/system/dao/SysRoleDao.go of the component Background Management Page. This manipulation of the argument sortName causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10218 is a medium severity SQL Injection vulnerability identified in version 2.1 of the ruoyi-go software developed by lostvip-com. The vulnerability resides in the SelectListPage function within the modules/system/dao/SysRoleDao.go file, specifically in the Background Management Page component. The flaw arises due to improper sanitization or validation of the 'sortName' argument, which is directly used in SQL queries. This allows an attacker to manipulate the 'sortName' parameter to inject arbitrary SQL commands. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing its risk profile. Although the CVSS 4.0 base score is 5.3 (medium), the exploit has been published publicly, which raises the likelihood of exploitation. The vendor was contacted but did not respond or provide a patch, leaving affected systems exposed. The vulnerability impacts the confidentiality, integrity, and availability of the backend database, potentially allowing attackers to extract sensitive data, modify or delete records, or disrupt service availability. The lack of authentication requirement and remote exploitability make this a notable risk for organizations using ruoyi-go 2.1, especially those relying on the Background Management Page for role management and access control. The absence of vendor response and patches further exacerbates the threat landscape around this vulnerability.
Potential Impact
For European organizations using ruoyi-go 2.1, this SQL Injection vulnerability poses a significant risk to the security of their backend systems. Exploitation could lead to unauthorized data disclosure, including sensitive user or organizational information, which may violate GDPR and other data protection regulations. Integrity of role and permission data could be compromised, potentially allowing privilege escalation or unauthorized access to critical systems. Availability could also be affected if attackers execute destructive SQL commands or cause database corruption. Given the remote and unauthenticated nature of the exploit, attackers can launch attacks from anywhere, increasing the attack surface. Organizations in sectors with high regulatory scrutiny such as finance, healthcare, and government are particularly at risk due to the potential for data breaches and operational disruptions. The public availability of exploits and lack of vendor patches mean that attackers can readily target vulnerable systems, increasing the urgency for European entities to assess and mitigate this vulnerability promptly.
Mitigation Recommendations
1. Immediate mitigation should include implementing web application firewalls (WAFs) with custom rules to detect and block malicious SQL injection payloads targeting the 'sortName' parameter. 2. Conduct a thorough code review of the SelectListPage function and related database access code to implement proper input validation and parameterized queries or prepared statements to eliminate SQL injection vectors. 3. If possible, upgrade to a later, patched version of ruoyi-go once available; if no patch exists, consider disabling or restricting access to the affected Background Management Page component until a fix is released. 4. Employ network segmentation and strict access controls to limit exposure of the management interfaces to trusted internal networks only. 5. Monitor logs and network traffic for unusual query patterns or repeated attempts to exploit the 'sortName' parameter. 6. Develop an incident response plan specifically addressing SQL injection attacks, including data backup and recovery procedures to mitigate potential data loss or corruption. 7. Engage with the vendor or community to encourage patch development and share threat intelligence related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-10T11:35:51.947Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c1f18512193b50d300cefe
Added to database: 9/10/2025, 9:45:41 PM
Last enriched: 9/10/2025, 10:00:37 PM
Last updated: 9/10/2025, 10:00:37 PM
Views: 2
Related Threats
CVE-2025-10234: Cross Site Scripting in Scada-LTS
MediumCVE-2025-10233: Path Traversal in kalcaddle kodbox
MediumCVE-2025-10232: Path Traversal in 299ko
MediumCVE-2025-10229: Open Redirect in Freshwork
MediumCVE-2025-10216: Race Condition in GrandNode
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.