Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10384: Improper Authorization in yangzongzhuan RuoYi

0
Medium
VulnerabilityCVE-2025-10384cvecve-2025-10384
Published: Sat Sep 13 2025 (09/13/2025, 19:32:06 UTC)
Source: CVE Database V5
Vendor/Project: yangzongzhuan
Product: RuoYi

Description

A flaw has been found in yangzongzhuan RuoYi up to 4.8.1. Affected by this vulnerability is an unknown functionality of the file /system/role/authUser/cancelAll of the component Role Handler. Executing manipulation of the argument roleId/userIds can lead to improper authorization. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/21/2025, 00:39:15 UTC

Technical Analysis

CVE-2025-10384 is a medium severity vulnerability affecting yangzongzhuan's RuoYi software versions up to 4.8.1. The flaw resides in the Role Handler component, specifically in the /system/role/authUser/cancelAll endpoint. This endpoint processes requests involving the manipulation of roleId and userIds arguments. Due to improper authorization checks, an attacker with low privileges (requiring some level of authentication but no user interaction) can remotely exploit this vulnerability to manipulate role assignments or removals without proper permissions. The vulnerability does not require user interaction and can be exploited over the network, making it a remote attack vector. The CVSS 4.0 vector indicates no privileges required (PR:L means low privileges), no user interaction, and partial impact on confidentiality, integrity, and availability. The vendor has been contacted but has not responded or issued a patch, and no known exploits are currently observed in the wild, although proof-of-concept exploits have been published. This vulnerability could allow unauthorized privilege escalation or unauthorized role modifications, potentially leading to unauthorized access or disruption of role-based access controls within affected systems.

Potential Impact

For European organizations using RuoYi versions 4.8.0 or 4.8.1, this vulnerability poses a risk to the integrity and confidentiality of role-based access control mechanisms. Attackers exploiting this flaw could alter user roles or revoke role assignments improperly, potentially granting themselves or others unauthorized privileges or removing legitimate access. This can lead to unauthorized data access, privilege escalation, or disruption of business processes relying on role-based permissions. Given that RuoYi is an open-source Java-based rapid development platform popular in some enterprise environments, organizations relying on it for internal management or web applications could face increased risk of insider threat exploitation or external attackers gaining footholds. The medium severity rating suggests moderate impact, but the lack of vendor response and patch availability increases risk exposure. European organizations with sensitive data or regulatory obligations (e.g., GDPR) must consider the potential for data breaches or compliance violations if unauthorized access occurs.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to the /system/role/authUser/cancelAll endpoint via firewall rules or web application firewalls (WAF) to trusted IPs only. 2. Implement strict monitoring and logging of role modification activities to detect anomalous or unauthorized changes. 3. Enforce multi-factor authentication and least privilege principles to limit the impact of compromised low-privilege accounts. 4. If possible, upgrade to a version of RuoYi that addresses this vulnerability once available or apply community-provided patches after thorough testing. 5. Conduct internal audits of user roles and permissions to identify and remediate any unauthorized changes. 6. Employ runtime application self-protection (RASP) tools to detect and block exploitation attempts targeting this endpoint. 7. Educate development and operations teams about this vulnerability to ensure rapid response and patch management once a fix is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-12T21:27:05.693Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c5c9cae14ebf9f5cc889e3

Added to database: 9/13/2025, 7:45:14 PM

Last enriched: 9/21/2025, 12:39:15 AM

Last updated: 10/30/2025, 2:19:29 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats