Skip to main content

CVE-2025-9410: SQL Injection in lostvip-com ruoyi-go

Medium
VulnerabilityCVE-2025-9410cvecve-2025-9410
Published: Mon Aug 25 2025 (08/25/2025, 16:32:06 UTC)
Source: CVE Database V5
Vendor/Project: lostvip-com
Product: ruoyi-go

Description

A weakness has been identified in lostvip-com ruoyi-go up to 2.1. The affected element is the function SelectListByPage of the file modules/system/dao/GenTableDao.go. Executing manipulation of the argument isAsc/orderByColumn can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/25/2025, 17:02:49 UTC

Technical Analysis

CVE-2025-9410 is a medium-severity SQL Injection vulnerability identified in the lostvip-com ruoyi-go software, specifically affecting versions up to 2.1. The vulnerability resides in the SelectListByPage function within the file modules/system/dao/GenTableDao.go. This function improperly handles the manipulation of the arguments isAsc and orderByColumn, which are used to control sorting behavior in SQL queries. An attacker can exploit this flaw by injecting malicious SQL code through these parameters, leading to unauthorized database queries. The vulnerability is remotely exploitable without requiring user interaction or authentication, increasing its risk profile. Although the vendor was notified early, no response or patch has been issued, and a public exploit is available, which raises the likelihood of exploitation. The CVSS 4.0 base score is 5.3, reflecting a medium impact on confidentiality, integrity, and availability, with low complexity and no privileges or user interaction needed. The vulnerability affects the core data access layer of ruoyi-go, a popular open-source Java-based rapid development framework used for building enterprise applications. Exploitation could allow attackers to extract sensitive data, modify database contents, or disrupt application functionality by executing arbitrary SQL commands. Given the lack of vendor response and public exploit availability, the threat is credible and should be addressed promptly.

Potential Impact

For European organizations using ruoyi-go versions 2.0 or 2.1, this vulnerability poses a tangible risk to data confidentiality, integrity, and availability. Exploitation could lead to unauthorized data disclosure, data tampering, or denial of service conditions impacting critical business applications built on this framework. Since ruoyi-go is used in enterprise environments for rapid application development, compromised systems could expose sensitive customer information, intellectual property, or internal business data. The remote and unauthenticated nature of the exploit increases the risk of automated attacks and widespread exploitation. Additionally, the absence of a vendor patch and public exploit availability heighten the urgency for European entities to assess their exposure. Organizations in regulated sectors such as finance, healthcare, and government may face compliance and reputational risks if exploited. The impact extends beyond data loss to potential operational disruptions and increased incident response costs.

Mitigation Recommendations

European organizations should immediately audit their software inventory to identify deployments of ruoyi-go versions 2.0 and 2.1. Until an official patch is released, implement the following mitigations: 1) Apply strict input validation and sanitization on the isAsc and orderByColumn parameters at the application or web server level to block malicious payloads. 2) Employ Web Application Firewalls (WAFs) with custom rules targeting SQL injection patterns specific to ruoyi-go's query parameters. 3) Restrict database user permissions to the minimum necessary, preventing unauthorized data modification or extraction even if SQL injection occurs. 4) Monitor logs for unusual query patterns or errors indicative of injection attempts. 5) Consider temporary disabling or restricting access to vulnerable endpoints if feasible. 6) Engage with the ruoyi-go community or maintainers for updates or unofficial patches. 7) Prepare incident response plans to quickly contain and remediate any exploitation. These targeted actions go beyond generic advice by focusing on the specific vulnerable function and parameters involved.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-25T08:45:05.090Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ac93acad5a09ad004dbb7d

Added to database: 8/25/2025, 4:47:40 PM

Last enriched: 8/25/2025, 5:02:49 PM

Last updated: 8/25/2025, 5:50:42 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats