Skip to main content

CVE-2025-6466: Unrestricted Upload in ageerle ruoyi-ai

Medium
VulnerabilityCVE-2025-6466cvecve-2025-6466
Published: Sun Jun 22 2025 (06/22/2025, 05:00:14 UTC)
Source: CVE Database V5
Vendor/Project: ageerle
Product: ruoyi-ai

Description

A vulnerability was found in ageerle ruoyi-ai 2.0.0 and classified as critical. Affected by this issue is the function speechToTextTranscriptionsV2/upload of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/service/impl/SseServiceImpl.java. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as 4e93ac86d4891c59ecfcd27c051de9b3c5379315. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 06/22/2025, 05:19:34 UTC

Technical Analysis

CVE-2025-6466 is a medium-severity vulnerability affecting version 2.0.0 of the ruoyi-ai product developed by ageerle. The vulnerability exists in the function speechToTextTranscriptionsV2/upload located in the source file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/service/impl/SseServiceImpl.java. Specifically, the issue arises from improper validation or sanitization of the File argument, which allows an attacker to perform unrestricted file uploads remotely without requiring user interaction or elevated privileges beyond low privileges. This unrestricted upload capability can enable an attacker to upload arbitrary files, potentially including malicious payloads such as web shells or malware, which could lead to further compromise of the affected system. The vulnerability has been publicly disclosed, and although no known exploits are currently observed in the wild, the availability of the exploit code increases the risk of exploitation. The vulnerability has a CVSS 4.0 base score of 5.3, reflecting a medium severity level, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is limited but present, as the attacker could upload files that may lead to data exposure, unauthorized modifications, or service disruption. The vendor has released version 2.0.1 which patches this vulnerability, identified by patch commit 4e93ac86d4891c59ecfcd27c051de9b3c5379315. It is strongly recommended to upgrade to this fixed version to mitigate the risk.

Potential Impact

For European organizations using ruoyi-ai version 2.0.0, this vulnerability poses a tangible risk of unauthorized file uploads that could lead to system compromise. The ability to upload arbitrary files remotely without user interaction or elevated privileges means attackers could deploy web shells or malware, potentially leading to data breaches, unauthorized access, or disruption of services. Organizations in sectors with high reliance on ruoyi-ai for speech-to-text transcription services may face operational interruptions or reputational damage if exploited. Additionally, if the uploaded files are used to pivot within the network, the impact could extend beyond the initial system. Given the medium CVSS score and the lack of known exploits in the wild, the immediate risk is moderate but could escalate if exploit code becomes widespread. European entities handling sensitive or regulated data should be particularly cautious, as exploitation could lead to violations of data protection regulations such as GDPR.

Mitigation Recommendations

1. Immediate upgrade of ruoyi-ai from version 2.0.0 to 2.0.1 or later, which contains the official patch addressing the unrestricted upload vulnerability. 2. Implement strict input validation and file type restrictions at the application and web server levels to prevent unauthorized file types from being uploaded. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious upload attempts targeting the vulnerable endpoint. 4. Monitor logs for unusual file upload activity, especially targeting the speechToTextTranscriptionsV2/upload function, and establish alerting mechanisms for anomalous behavior. 5. Restrict network access to the vulnerable service to trusted IP ranges where feasible, reducing exposure to remote attackers. 6. Conduct regular security assessments and penetration testing focused on file upload functionalities to detect similar weaknesses. 7. Harden the hosting environment by enforcing least privilege principles, ensuring that even if malicious files are uploaded, their execution or impact is limited. 8. Educate development teams on secure coding practices related to file uploads to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-21T05:12:30.328Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68578ede179a4edd60b35626

Added to database: 6/22/2025, 5:04:30 AM

Last enriched: 6/22/2025, 5:19:34 AM

Last updated: 8/13/2025, 7:12:37 AM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats