CVE-2025-10384: Improper Authorization in yangzongzhuan RuoYi
A flaw has been found in yangzongzhuan RuoYi up to 4.8.1. Affected by this vulnerability is an unknown functionality of the file /system/role/authUser/cancelAll of the component Role Handler. Executing manipulation of the argument roleId/userIds can lead to improper authorization. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10384 is a medium-severity improper authorization vulnerability affecting yangzongzhuan RuoYi versions up to 4.8.1. The flaw resides in the Role Handler component, specifically in the /system/role/authUser/cancelAll endpoint. This endpoint processes arguments roleId and userIds to manage role-user associations. Due to insufficient authorization checks, an attacker with low privileges can remotely manipulate these parameters to perform unauthorized actions, such as revoking or altering user roles without proper permissions. The vulnerability does not require user interaction and can be exploited over the network without authentication, though it requires low privileges (PR:L). The CVSS 4.0 vector indicates no user interaction, no scope change, and partial impact on confidentiality, integrity, and availability. The vendor was notified but did not respond, and no official patches or mitigations have been published yet. Although no known exploits are currently observed in the wild, a public exploit has been published, increasing the risk of exploitation.
Potential Impact
For European organizations using yangzongzhuan RuoYi, particularly versions 4.8.0 and 4.8.1, this vulnerability poses a significant risk to role-based access control integrity. Unauthorized modification or cancellation of user roles can lead to privilege escalation, unauthorized access to sensitive data, disruption of business processes, and potential compliance violations under GDPR due to improper access controls. The ability to exploit this remotely without user interaction increases the attack surface, especially for organizations exposing the affected endpoints to the internet or internal networks with insufficient segmentation. This could lead to lateral movement within networks, data breaches, or sabotage of critical systems relying on RuoYi for role management. The lack of vendor response and patches further exacerbates the risk, requiring organizations to implement compensating controls promptly.
Mitigation Recommendations
1. Immediately audit all systems running yangzongzhuan RuoYi versions 4.8.0 and 4.8.1 to identify exposure of the /system/role/authUser/cancelAll endpoint. 2. Restrict network access to the affected endpoint using firewalls or network segmentation to limit exposure only to trusted administrators. 3. Implement strict monitoring and alerting on role modification activities, especially those involving bulk role cancellations or unusual user-role changes. 4. Employ Web Application Firewalls (WAF) with custom rules to detect and block suspicious requests targeting roleId and userIds parameters. 5. If possible, temporarily disable or restrict the functionality of the cancelAll endpoint until a patch is available. 6. Enforce multi-factor authentication and least privilege principles for all users with role management capabilities to reduce the risk of exploitation. 7. Stay updated with vendor communications and apply patches immediately once released. 8. Conduct penetration testing focused on authorization controls within RuoYi to identify any other potential weaknesses.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10384: Improper Authorization in yangzongzhuan RuoYi
Description
A flaw has been found in yangzongzhuan RuoYi up to 4.8.1. Affected by this vulnerability is an unknown functionality of the file /system/role/authUser/cancelAll of the component Role Handler. Executing manipulation of the argument roleId/userIds can lead to improper authorization. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10384 is a medium-severity improper authorization vulnerability affecting yangzongzhuan RuoYi versions up to 4.8.1. The flaw resides in the Role Handler component, specifically in the /system/role/authUser/cancelAll endpoint. This endpoint processes arguments roleId and userIds to manage role-user associations. Due to insufficient authorization checks, an attacker with low privileges can remotely manipulate these parameters to perform unauthorized actions, such as revoking or altering user roles without proper permissions. The vulnerability does not require user interaction and can be exploited over the network without authentication, though it requires low privileges (PR:L). The CVSS 4.0 vector indicates no user interaction, no scope change, and partial impact on confidentiality, integrity, and availability. The vendor was notified but did not respond, and no official patches or mitigations have been published yet. Although no known exploits are currently observed in the wild, a public exploit has been published, increasing the risk of exploitation.
Potential Impact
For European organizations using yangzongzhuan RuoYi, particularly versions 4.8.0 and 4.8.1, this vulnerability poses a significant risk to role-based access control integrity. Unauthorized modification or cancellation of user roles can lead to privilege escalation, unauthorized access to sensitive data, disruption of business processes, and potential compliance violations under GDPR due to improper access controls. The ability to exploit this remotely without user interaction increases the attack surface, especially for organizations exposing the affected endpoints to the internet or internal networks with insufficient segmentation. This could lead to lateral movement within networks, data breaches, or sabotage of critical systems relying on RuoYi for role management. The lack of vendor response and patches further exacerbates the risk, requiring organizations to implement compensating controls promptly.
Mitigation Recommendations
1. Immediately audit all systems running yangzongzhuan RuoYi versions 4.8.0 and 4.8.1 to identify exposure of the /system/role/authUser/cancelAll endpoint. 2. Restrict network access to the affected endpoint using firewalls or network segmentation to limit exposure only to trusted administrators. 3. Implement strict monitoring and alerting on role modification activities, especially those involving bulk role cancellations or unusual user-role changes. 4. Employ Web Application Firewalls (WAF) with custom rules to detect and block suspicious requests targeting roleId and userIds parameters. 5. If possible, temporarily disable or restrict the functionality of the cancelAll endpoint until a patch is available. 6. Enforce multi-factor authentication and least privilege principles for all users with role management capabilities to reduce the risk of exploitation. 7. Stay updated with vendor communications and apply patches immediately once released. 8. Conduct penetration testing focused on authorization controls within RuoYi to identify any other potential weaknesses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-12T21:27:05.693Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c5c9cae14ebf9f5cc889e3
Added to database: 9/13/2025, 7:45:14 PM
Last enriched: 9/13/2025, 8:00:14 PM
Last updated: 9/13/2025, 9:16:12 PM
Views: 5
Related Threats
CVE-2025-10374: Improper Authorization in Shenzhen Sixun Business Management System
MediumCVE-2025-10373: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-10372: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-10371: Unrestricted Upload in eCharge Hardy Barth Salia PLCC
MediumCVE-2025-10370: Cross Site Scripting in MiczFlor RPi-Jukebox-RFID
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.