Skip to main content

CVE-2025-8847: Cross Site Scripting in yangzongzhuan RuoYi

Medium
VulnerabilityCVE-2025-8847cvecve-2025-8847
Published: Mon Aug 11 2025 (08/11/2025, 13:02:06 UTC)
Source: CVE Database V5
Vendor/Project: yangzongzhuan
Product: RuoYi

Description

A vulnerability was found in yangzongzhuan RuoYi up to 4.8.1. Affected by this vulnerability is the function Edit of the file /system/notice/edit. The manipulation of the argument noticeTitle/noticeContent leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 08/11/2025, 13:33:11 UTC

Technical Analysis

CVE-2025-8847 is a cross-site scripting (XSS) vulnerability identified in the yangzongzhuan RuoYi software, specifically affecting versions 4.8.0 and 4.8.1. The vulnerability resides in the Edit function of the /system/notice/edit endpoint, where improper sanitization or validation of user-supplied input in the parameters noticeTitle and noticeContent allows an attacker to inject malicious scripts. Because the vulnerability can be exploited remotely without authentication, an attacker can craft a specially crafted request that, when processed by the vulnerable endpoint, results in the execution of arbitrary JavaScript code in the context of the victim's browser. This can lead to session hijacking, defacement, or redirection to malicious sites. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction (e.g., victim must view the malicious content). The vulnerability does not impact confidentiality directly but has limited impact on integrity and availability. Although no public exploits are currently known in the wild, the disclosure of the vulnerability and the availability of technical details increase the risk of exploitation. No official patches or mitigations have been linked yet, so affected users must rely on other defensive measures until a fix is released.

Potential Impact

For European organizations using yangzongzhuan RuoYi versions 4.8.0 or 4.8.1, this vulnerability poses a risk primarily to web application security and user trust. Successful exploitation could allow attackers to execute malicious scripts in users' browsers, potentially leading to session hijacking, credential theft, or phishing attacks. This is particularly concerning for organizations handling sensitive or regulated data, such as financial institutions, healthcare providers, or government agencies, where user session integrity is critical. The vulnerability could also be leveraged to spread malware or conduct targeted attacks against employees or customers. While the direct impact on system availability or data integrity is limited, the reputational damage and potential regulatory consequences (e.g., GDPR violations due to compromised user data) could be significant. The remote and unauthenticated nature of the exploit increases the attack surface, especially for public-facing applications. European organizations with limited web application security monitoring or outdated RuoYi deployments are at higher risk.

Mitigation Recommendations

1. Immediate mitigation should include implementing strict input validation and output encoding on the noticeTitle and noticeContent parameters to neutralize malicious scripts. 2. Employ a Web Application Firewall (WAF) with rules targeting common XSS attack patterns to block exploit attempts at the network edge. 3. Restrict access to the /system/notice/edit endpoint to authorized users and consider adding multi-factor authentication to reduce unauthorized usage. 4. Conduct a thorough audit of all user input handling in the RuoYi application to identify and remediate similar vulnerabilities. 5. Monitor web server and application logs for suspicious requests targeting the vulnerable endpoint. 6. Educate users about the risks of clicking on suspicious links or interacting with untrusted content. 7. Stay alert for official patches or updates from yangzongzhuan and apply them promptly once available. 8. Consider deploying Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 9. If feasible, isolate or sandbox the affected application components to limit potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-10T15:59:30.302Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6899ed76ad5a09ad0025a098

Added to database: 8/11/2025, 1:17:42 PM

Last enriched: 8/11/2025, 1:33:11 PM

Last updated: 8/11/2025, 1:33:11 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats