CVE-2025-7902: Cross Site Scripting in yangzongzhuan RuoYi
A vulnerability classified as problematic has been found in yangzongzhuan RuoYi up to 4.8.1. Affected is the function addSave of the file com/ruoyi/web/controller/system/SysNoticeController.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7902 is a cross-site scripting (XSS) vulnerability identified in the yangzongzhuan RuoYi framework, specifically affecting versions 4.8.0 and 4.8.1. The vulnerability resides in the addSave function within the SysNoticeController.java file (com/ruoyi/web/controller/system/SysNoticeController.java). This function fails to properly sanitize or encode user-supplied input, allowing an attacker to inject malicious scripts that execute in the context of a victim's browser. The vulnerability is remotely exploitable without authentication, requiring only user interaction to trigger the malicious payload. The disclosed CVSS 4.0 score is 5.1, categorizing it as medium severity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L indicates low privileges, but the vector states no privileges needed), and user interaction is necessary (UI:P). The impact primarily affects confidentiality and integrity to a limited extent, with no direct impact on availability. Although no known exploits are currently active in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of users, or deliver further malware, especially in environments where RuoYi is used for administrative or internal web applications. The lack of an official patch link suggests that remediation may require manual code review and input validation enhancements.
Potential Impact
For European organizations using the RuoYi framework, particularly in sectors relying on internal web portals or administrative dashboards, this XSS vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed under the guise of legitimate users. The exploitation could lead to data leakage or manipulation, undermining trust and compliance with data protection regulations such as GDPR. Since RuoYi is a popular Java-based rapid development platform, organizations that have integrated it into their enterprise applications may face targeted attacks aiming to exploit this vulnerability. The medium severity rating indicates moderate risk, but the ease of remote exploitation and public availability of exploit code heighten the urgency for mitigation. The impact is more pronounced in environments where users have elevated privileges or where sensitive information is accessible via the affected application.
Mitigation Recommendations
European organizations should immediately audit their use of the RuoYi framework, specifically checking for versions 4.8.0 and 4.8.1. In the absence of an official patch, developers must implement strict input validation and output encoding in the addSave function of SysNoticeController.java to neutralize malicious scripts. Employing security libraries or frameworks that automatically handle XSS prevention is recommended. Additionally, implementing Content Security Policy (CSP) headers can mitigate the impact of injected scripts by restricting script execution sources. Organizations should also conduct thorough penetration testing and code reviews to identify similar vulnerabilities elsewhere in their applications. User awareness training to recognize suspicious links or inputs can reduce the likelihood of successful exploitation. Monitoring web application logs for unusual input patterns or error messages related to the vulnerable endpoint can help detect attempted attacks early.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-7902: Cross Site Scripting in yangzongzhuan RuoYi
Description
A vulnerability classified as problematic has been found in yangzongzhuan RuoYi up to 4.8.1. Affected is the function addSave of the file com/ruoyi/web/controller/system/SysNoticeController.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7902 is a cross-site scripting (XSS) vulnerability identified in the yangzongzhuan RuoYi framework, specifically affecting versions 4.8.0 and 4.8.1. The vulnerability resides in the addSave function within the SysNoticeController.java file (com/ruoyi/web/controller/system/SysNoticeController.java). This function fails to properly sanitize or encode user-supplied input, allowing an attacker to inject malicious scripts that execute in the context of a victim's browser. The vulnerability is remotely exploitable without authentication, requiring only user interaction to trigger the malicious payload. The disclosed CVSS 4.0 score is 5.1, categorizing it as medium severity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L indicates low privileges, but the vector states no privileges needed), and user interaction is necessary (UI:P). The impact primarily affects confidentiality and integrity to a limited extent, with no direct impact on availability. Although no known exploits are currently active in the wild, the public disclosure of the exploit code increases the risk of exploitation. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of users, or deliver further malware, especially in environments where RuoYi is used for administrative or internal web applications. The lack of an official patch link suggests that remediation may require manual code review and input validation enhancements.
Potential Impact
For European organizations using the RuoYi framework, particularly in sectors relying on internal web portals or administrative dashboards, this XSS vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed under the guise of legitimate users. The exploitation could lead to data leakage or manipulation, undermining trust and compliance with data protection regulations such as GDPR. Since RuoYi is a popular Java-based rapid development platform, organizations that have integrated it into their enterprise applications may face targeted attacks aiming to exploit this vulnerability. The medium severity rating indicates moderate risk, but the ease of remote exploitation and public availability of exploit code heighten the urgency for mitigation. The impact is more pronounced in environments where users have elevated privileges or where sensitive information is accessible via the affected application.
Mitigation Recommendations
European organizations should immediately audit their use of the RuoYi framework, specifically checking for versions 4.8.0 and 4.8.1. In the absence of an official patch, developers must implement strict input validation and output encoding in the addSave function of SysNoticeController.java to neutralize malicious scripts. Employing security libraries or frameworks that automatically handle XSS prevention is recommended. Additionally, implementing Content Security Policy (CSP) headers can mitigate the impact of injected scripts by restricting script execution sources. Organizations should also conduct thorough penetration testing and code reviews to identify similar vulnerabilities elsewhere in their applications. User awareness training to recognize suspicious links or inputs can reduce the likelihood of successful exploitation. Monitoring web application logs for unusual input patterns or error messages related to the vulnerable endpoint can help detect attempted attacks early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-19T14:08:19.083Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687d1647a83201eaac03681c
Added to database: 7/20/2025, 4:16:07 PM
Last enriched: 7/28/2025, 12:58:44 AM
Last updated: 10/19/2025, 5:47:41 AM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
AI Chat Data Is History's Most Thorough Record of Enterprise Secrets. Secure It Wisely
MediumAI Agent Security: Whose Responsibility Is It?
MediumMicrosoft Disrupts Ransomware Campaign Abusing Azure Certificates
MediumMicrosoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign
MediumIdentity Security: Your First and Last Line of Defense
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.