Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7901: Cross Site Scripting in yangzongzhuan RuoYi

0
Medium
VulnerabilityCVE-2025-7901cvecve-2025-7901
Published: Sun Jul 20 2025 (07/20/2025, 15:32:04 UTC)
Source: CVE Database V5
Vendor/Project: yangzongzhuan
Product: RuoYi

Description

A vulnerability was found in yangzongzhuan RuoYi up to 4.8.1. It has been rated as problematic. This issue affects some unknown processing of the file /swagger-ui/index.html of the component Swagger UI. The manipulation of the argument configUrl leads to cross site scripting. The attack may be initiated remotely.

AI-Powered Analysis

AILast updated: 07/28/2025, 00:57:29 UTC

Technical Analysis

CVE-2025-7901 is a cross-site scripting (XSS) vulnerability identified in the yangzongzhuan RuoYi framework, specifically affecting versions up to 4.8.1. The vulnerability resides in the Swagger UI component, particularly in the processing of the /swagger-ui/index.html file. The issue arises from improper handling of the configUrl argument, which can be manipulated by an attacker to inject malicious scripts. This vulnerability is remotely exploitable without requiring authentication, although it does require user interaction (e.g., a victim visiting a crafted URL). The CVSS 4.0 base score is 5.3, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required. The impact primarily affects the confidentiality and integrity of the user's session or data, as the injected script could steal sensitive information or perform actions on behalf of the user. The vulnerability does not affect availability and does not require special conditions such as user authentication or elevated privileges. No known exploits are currently reported in the wild, and no patches have been linked yet. Given the involvement of Swagger UI, which is commonly used for API documentation and testing, the vulnerability could be leveraged to target developers or administrators accessing the affected interface, potentially leading to session hijacking or further exploitation within the affected environment.

Potential Impact

For European organizations, the impact of CVE-2025-7901 could be significant in environments where the RuoYi framework is deployed, especially in internal or external-facing API documentation portals using Swagger UI. Successful exploitation could lead to theft of authentication tokens, session cookies, or other sensitive information, enabling attackers to impersonate legitimate users or escalate privileges. This could compromise internal systems, leak confidential data, or facilitate lateral movement within networks. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face compliance risks and reputational damage if such vulnerabilities are exploited. Moreover, since the vulnerability requires user interaction, targeted phishing or social engineering campaigns could be used to lure users into triggering the exploit. The lack of authentication requirement for exploitation increases the attack surface, making it easier for remote attackers to attempt exploitation. However, the medium severity rating and absence of known exploits suggest that while the threat is real, it may not be immediately critical but should be addressed promptly to prevent escalation.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the Swagger UI interface to trusted internal networks or authenticated users only, reducing exposure to external attackers. 2. Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the Swagger UI context. 3. Sanitize and validate all inputs, especially the configUrl parameter, to prevent injection of malicious scripts. 4. Monitor web server logs for unusual requests targeting /swagger-ui/index.html with suspicious configUrl parameters. 5. Educate users about the risk of clicking on untrusted links that may lead to malicious Swagger UI pages. 6. Apply patches or updates from the vendor as soon as they become available. 7. Consider deploying Web Application Firewalls (WAF) with rules to detect and block XSS payloads targeting Swagger UI endpoints. 8. Conduct regular security assessments and penetration testing focusing on API documentation interfaces and related components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-19T14:08:11.164Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687d0f3fa83201eaac034b3a

Added to database: 7/20/2025, 3:46:07 PM

Last enriched: 7/28/2025, 12:57:29 AM

Last updated: 10/18/2025, 9:36:09 PM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats