Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67342: n/a

0
Medium
VulnerabilityCVE-2025-67342cvecve-2025-67342
Published: Fri Dec 12 2025 (12/12/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

RuoYi versions 4.8.1 and earlier is affected by a stored XSS vulnerability in the /system/menu/edit endpoint. While the endpoint is protected by an XSS filter, the protection can be bypassed. Additionally, because the menu is shared across all users, any user with menu modification permissions can impact all users by exploiting this stored XSS vulnerability.

AI-Powered Analysis

AILast updated: 12/12/2025, 16:43:23 UTC

Technical Analysis

CVE-2025-67342 identifies a stored Cross-Site Scripting (XSS) vulnerability in the RuoYi framework, versions 4.8.1 and earlier, specifically targeting the /system/menu/edit endpoint. RuoYi is a popular Java-based rapid development framework used for enterprise applications, often deployed in administrative portals. The vulnerability arises because the endpoint, while protected by an XSS filter, can be bypassed, allowing attackers with menu modification privileges to inject malicious JavaScript code into the shared menu data. This stored script executes in the browsers of all users who access the menu, enabling attackers to perform actions such as session hijacking, credential theft, or executing unauthorized commands within the context of the victim's session. The shared nature of the menu means the impact is not limited to the attacker’s own account but extends to all users of the system. Although no CVSS score or patch is currently available and no known exploits have been reported in the wild, the vulnerability's characteristics suggest a significant security risk. The attack requires the attacker to have menu modification permissions, which implies some level of authenticated access, but once exploited, the scope affects all users. This vulnerability highlights the importance of robust input validation and output encoding in web applications, especially in shared components. Given RuoYi’s use in enterprise environments, exploitation could lead to widespread compromise of user sessions and sensitive data.

Potential Impact

For European organizations, the impact of CVE-2025-67342 can be substantial, particularly in sectors relying on RuoYi-based applications for internal management or customer-facing portals. The stored XSS vulnerability allows an attacker with menu modification rights to inject malicious scripts that execute in all users’ browsers, potentially leading to widespread session hijacking, unauthorized data access, or privilege escalation. This could result in data breaches, loss of user trust, and regulatory non-compliance, especially under GDPR. The shared menu nature amplifies the risk, as a single compromised account with modification privileges can affect the entire user base. Organizations in finance, healthcare, and government sectors are particularly vulnerable due to the sensitive nature of their data and the criticality of their systems. Additionally, the absence of a patch and the ability to bypass existing filters increase the likelihood of exploitation once attackers gain sufficient access. The requirement for authenticated access limits exposure but does not eliminate risk, especially in environments with weak access controls or insider threats. The potential for lateral movement and persistent presence within networks further elevates the threat level for European enterprises.

Mitigation Recommendations

To mitigate CVE-2025-67342 effectively, European organizations should implement the following measures beyond generic advice: 1) Immediately audit and restrict menu modification permissions to the minimum necessary users, ideally limiting to trusted administrators only. 2) Implement additional server-side input validation and output encoding specifically tailored to the /system/menu/edit endpoint to prevent script injection, supplementing the existing XSS filter. 3) Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in user browsers. 4) Monitor logs and user activity for unusual menu modification attempts or patterns indicative of exploitation. 5) Conduct regular security assessments and penetration testing focusing on input validation bypasses in shared components. 6) Prepare incident response plans to quickly isolate and remediate compromised accounts. 7) Engage with the RuoYi development community or vendors to obtain patches or updates as they become available and apply them promptly. 8) Educate users with elevated privileges about the risks of XSS and secure coding practices. These targeted steps will reduce the attack surface and limit the potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693c43d3dc37602712bdbc2c

Added to database: 12/12/2025, 4:33:23 PM

Last enriched: 12/12/2025, 4:43:23 PM

Last updated: 12/15/2025, 1:29:15 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats