Skip to main content

CVE-2025-10989: Improper Authorization in yangzongzhuan RuoYi

Medium
VulnerabilityCVE-2025-10989cvecve-2025-10989
Published: Fri Sep 26 2025 (09/26/2025, 00:32:10 UTC)
Source: CVE Database V5
Vendor/Project: yangzongzhuan
Product: RuoYi

Description

A security flaw has been discovered in yangzongzhuan RuoYi up to 4.8.1. This vulnerability affects unknown code of the file /system/role/authUser/selectAll. Performing manipulation of the argument userIds results in improper authorization. The attack can be initiated remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/26/2025, 01:04:03 UTC

Technical Analysis

CVE-2025-10989 is a medium-severity security vulnerability affecting yangzongzhuan RuoYi versions up to 4.8.1. The flaw exists in the authorization logic of the endpoint /system/role/authUser/selectAll, where manipulation of the userIds argument allows an attacker to bypass proper authorization controls. This improper authorization vulnerability enables a remote attacker to potentially access or manipulate data or functions that should be restricted. The vulnerability does not require user interaction and can be exploited remotely with low attack complexity, but it does require some level of privileges (PR:L) indicating that the attacker must have limited privileges on the system. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects network attack vector, low complexity, no user interaction, and partial impacts on confidentiality, integrity, and availability. The vendor has not responded to the disclosure, and no official patches have been released yet. Although no known exploits in the wild have been reported, a public exploit is available, increasing the risk of exploitation. The vulnerability could allow unauthorized access to user role data or unauthorized privilege escalation within the RuoYi system, potentially leading to data exposure or unauthorized administrative actions.

Potential Impact

For European organizations using yangzongzhuan RuoYi, this vulnerability poses a risk of unauthorized access to sensitive role and user authorization data, which could lead to privilege escalation or unauthorized administrative control within applications relying on RuoYi. This can compromise the confidentiality and integrity of user data and system configurations, potentially disrupting business operations or enabling further attacks. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if unauthorized access leads to data breaches. The lack of vendor response and patches increases exposure time, making timely mitigation critical. The medium severity rating suggests a moderate impact, but the availability of a public exploit means attackers could leverage this vulnerability to gain footholds or move laterally within networks.

Mitigation Recommendations

European organizations should immediately audit their use of yangzongzhuan RuoYi, specifically versions 4.8.0 and 4.8.1, and restrict access to the /system/role/authUser/selectAll endpoint to trusted administrators only. Implement network-level controls such as IP whitelisting and VPN access to limit exposure of the vulnerable service. Conduct thorough privilege reviews to ensure users have the minimum necessary permissions, reducing the risk posed by compromised accounts. Monitor logs for unusual access patterns or attempts to manipulate userIds parameters. If possible, implement application-layer WAF (Web Application Firewall) rules to detect and block suspicious requests targeting this endpoint. Organizations should also consider isolating RuoYi instances from critical infrastructure until a vendor patch or official fix is available. Engage with the vendor or community for updates and apply patches promptly once released. Finally, conduct internal penetration testing to verify the effectiveness of mitigations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-25T17:14:33.456Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d5e3049e21be37e93844d2

Added to database: 9/26/2025, 12:49:08 AM

Last enriched: 9/26/2025, 1:04:03 AM

Last updated: 9/26/2025, 2:00:20 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats