CVE-2025-10473: SQL Injection in yangzongzhuan RuoYi
A security flaw has been discovered in yangzongzhuan RuoYi up to 4.8.1. This impacts the function filterKeyword of the file /com/ruoyi/common/utils/sql/SqlUtil.java of the component Blacklist Handler. The manipulation results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be exploited.
AI Analysis
Technical Summary
CVE-2025-10473 is a medium-severity SQL Injection vulnerability identified in the yangzongzhuan RuoYi framework versions up to 4.8.1. The flaw resides specifically in the filterKeyword function within the /com/ruoyi/common/utils/sql/SqlUtil.java file, which is part of the Blacklist Handler component. This vulnerability allows an attacker to manipulate SQL queries by injecting malicious input remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The injection flaw can lead to unauthorized access or modification of database contents, potentially compromising data confidentiality, integrity, and availability. Although the CVSS score is 5.3 (medium), the vulnerability's exploitability is facilitated by low attack complexity and no need for user interaction, increasing its risk profile. The public release of an exploit heightens the urgency for remediation. However, there are no known exploits currently observed in the wild. The vulnerability does not affect the system component's confidentiality, integrity, or availability at a critical level but does pose a significant risk if exploited, especially in environments where sensitive data is stored or processed. The lack of official patches at the time of publication necessitates immediate attention to alternative mitigation strategies.
Potential Impact
For European organizations using the RuoYi framework, this vulnerability could lead to unauthorized database access, data leakage, or data manipulation. Given that RuoYi is a popular Java-based rapid development platform used in enterprise applications, exploitation could disrupt business operations, compromise sensitive customer or internal data, and damage organizational reputation. The remote exploitability without user interaction or authentication increases the risk of automated attacks, potentially affecting multiple systems quickly. Organizations in sectors such as finance, healthcare, and government, where data sensitivity and regulatory compliance (e.g., GDPR) are paramount, face heightened risks. A successful attack could result in regulatory penalties, loss of customer trust, and operational downtime. Additionally, the medium severity rating suggests that while the vulnerability is not critical, it still warrants prompt mitigation to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Applying strict input validation and sanitization on all inputs processed by the filterKeyword function or related SQL query parameters to prevent injection payloads. 2) Employing Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the affected endpoints. 3) Restricting database user privileges to the minimum necessary, limiting the potential impact of a successful injection. 4) Monitoring application logs and database queries for anomalous activities indicative of injection attempts. 5) Isolating critical systems and enforcing network segmentation to reduce attack surface exposure. 6) Planning and prioritizing an upgrade to a patched version of RuoYi once available, or applying vendor-provided workarounds. 7) Conducting security code reviews focusing on SQL query construction and parameter handling within the application. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vector.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10473: SQL Injection in yangzongzhuan RuoYi
Description
A security flaw has been discovered in yangzongzhuan RuoYi up to 4.8.1. This impacts the function filterKeyword of the file /com/ruoyi/common/utils/sql/SqlUtil.java of the component Blacklist Handler. The manipulation results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be exploited.
AI-Powered Analysis
Technical Analysis
CVE-2025-10473 is a medium-severity SQL Injection vulnerability identified in the yangzongzhuan RuoYi framework versions up to 4.8.1. The flaw resides specifically in the filterKeyword function within the /com/ruoyi/common/utils/sql/SqlUtil.java file, which is part of the Blacklist Handler component. This vulnerability allows an attacker to manipulate SQL queries by injecting malicious input remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The injection flaw can lead to unauthorized access or modification of database contents, potentially compromising data confidentiality, integrity, and availability. Although the CVSS score is 5.3 (medium), the vulnerability's exploitability is facilitated by low attack complexity and no need for user interaction, increasing its risk profile. The public release of an exploit heightens the urgency for remediation. However, there are no known exploits currently observed in the wild. The vulnerability does not affect the system component's confidentiality, integrity, or availability at a critical level but does pose a significant risk if exploited, especially in environments where sensitive data is stored or processed. The lack of official patches at the time of publication necessitates immediate attention to alternative mitigation strategies.
Potential Impact
For European organizations using the RuoYi framework, this vulnerability could lead to unauthorized database access, data leakage, or data manipulation. Given that RuoYi is a popular Java-based rapid development platform used in enterprise applications, exploitation could disrupt business operations, compromise sensitive customer or internal data, and damage organizational reputation. The remote exploitability without user interaction or authentication increases the risk of automated attacks, potentially affecting multiple systems quickly. Organizations in sectors such as finance, healthcare, and government, where data sensitivity and regulatory compliance (e.g., GDPR) are paramount, face heightened risks. A successful attack could result in regulatory penalties, loss of customer trust, and operational downtime. Additionally, the medium severity rating suggests that while the vulnerability is not critical, it still warrants prompt mitigation to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. These include: 1) Applying strict input validation and sanitization on all inputs processed by the filterKeyword function or related SQL query parameters to prevent injection payloads. 2) Employing Web Application Firewalls (WAFs) configured to detect and block SQL injection patterns targeting the affected endpoints. 3) Restricting database user privileges to the minimum necessary, limiting the potential impact of a successful injection. 4) Monitoring application logs and database queries for anomalous activities indicative of injection attempts. 5) Isolating critical systems and enforcing network segmentation to reduce attack surface exposure. 6) Planning and prioritizing an upgrade to a patched version of RuoYi once available, or applying vendor-provided workarounds. 7) Conducting security code reviews focusing on SQL query construction and parameter handling within the application. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-15T12:52:33.844Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c8aa71ee2781683eebd804
Added to database: 9/16/2025, 12:08:17 AM
Last enriched: 9/16/2025, 12:27:54 AM
Last updated: 9/16/2025, 12:27:54 AM
Views: 2
Related Threats
CVE-2025-59437: CWE-918 Server-Side Request Forgery (SSRF) in fedorindutny ip
LowCVE-2025-59436: CWE-918 Server-Side Request Forgery (SSRF) in fedorindutny ip
LowCVE-2025-10429: SQL Injection in SourceCodester Pet Grooming Management Software
MediumCVE-2025-10440: OS Command Injection in D-Link DI-8100
MediumCVE-2025-10428: Unrestricted Upload in SourceCodester Pet Grooming Management Software
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.