CVE-2025-9411: SQL Injection in lostvip-com ruoyi-go
A security vulnerability has been detected in lostvip-com ruoyi-go up to 2.1. The impacted element is the function SelectPageList of the file modules/system/service/LoginInforService.go. The manipulation of the argument isAsc leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9411 is a medium-severity SQL Injection vulnerability identified in the ruoyi-go product developed by lostvip-com, specifically affecting versions 2.0 and 2.1. The vulnerability resides in the SelectPageList function within the LoginInforService.go file, part of the system module. The flaw arises from improper handling of the 'isAsc' argument, which is used to control sorting order in SQL queries. An attacker can manipulate this parameter to inject malicious SQL code, potentially altering the intended query logic. This vulnerability is remotely exploitable without requiring user interaction or authentication, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the vendor was notified early, no response or patch has been provided, and no known exploits have been observed in the wild yet. The public disclosure of the exploit code increases the likelihood of exploitation attempts. The vulnerability can lead to unauthorized data access, data modification, or disruption of service depending on the database and application context. The absence of patches necessitates immediate attention from users of affected versions to mitigate risk.
Potential Impact
For European organizations using ruoyi-go versions 2.0 or 2.1, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their data and services. Exploitation could allow attackers to extract sensitive information such as user credentials or internal system data, modify records, or disrupt application functionality. Given that ruoyi-go is a framework often used in enterprise applications, the impact could extend to critical business processes, compliance obligations (e.g., GDPR), and customer trust. The remote and unauthenticated nature of the exploit increases the attack surface, especially for internet-facing services. Organizations in sectors with high regulatory scrutiny or handling sensitive personal or financial data are particularly vulnerable. Additionally, the lack of vendor response and patches means that organizations must rely on internal mitigations, increasing operational overhead and risk exposure until a fix is available.
Mitigation Recommendations
1. Immediate mitigation should include implementing Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'isAsc' parameter. 2. Conduct thorough input validation and sanitization on all user-supplied parameters, especially those controlling query logic such as sorting order. 3. Employ parameterized queries or prepared statements in the affected codebase to prevent injection attacks. 4. Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. 5. Monitor application logs and database queries for anomalous activity indicative of injection attempts. 6. If possible, isolate or restrict access to the affected service from untrusted networks until a patch or update is available. 7. Engage with the ruoyi-go community or maintainers to track any forthcoming patches or official advisories. 8. Prepare incident response plans specific to SQL injection attacks, including data integrity verification and recovery procedures. These steps go beyond generic advice by focusing on the specific vulnerable parameter and the current lack of vendor remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-9411: SQL Injection in lostvip-com ruoyi-go
Description
A security vulnerability has been detected in lostvip-com ruoyi-go up to 2.1. The impacted element is the function SelectPageList of the file modules/system/service/LoginInforService.go. The manipulation of the argument isAsc leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9411 is a medium-severity SQL Injection vulnerability identified in the ruoyi-go product developed by lostvip-com, specifically affecting versions 2.0 and 2.1. The vulnerability resides in the SelectPageList function within the LoginInforService.go file, part of the system module. The flaw arises from improper handling of the 'isAsc' argument, which is used to control sorting order in SQL queries. An attacker can manipulate this parameter to inject malicious SQL code, potentially altering the intended query logic. This vulnerability is remotely exploitable without requiring user interaction or authentication, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although the vendor was notified early, no response or patch has been provided, and no known exploits have been observed in the wild yet. The public disclosure of the exploit code increases the likelihood of exploitation attempts. The vulnerability can lead to unauthorized data access, data modification, or disruption of service depending on the database and application context. The absence of patches necessitates immediate attention from users of affected versions to mitigate risk.
Potential Impact
For European organizations using ruoyi-go versions 2.0 or 2.1, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their data and services. Exploitation could allow attackers to extract sensitive information such as user credentials or internal system data, modify records, or disrupt application functionality. Given that ruoyi-go is a framework often used in enterprise applications, the impact could extend to critical business processes, compliance obligations (e.g., GDPR), and customer trust. The remote and unauthenticated nature of the exploit increases the attack surface, especially for internet-facing services. Organizations in sectors with high regulatory scrutiny or handling sensitive personal or financial data are particularly vulnerable. Additionally, the lack of vendor response and patches means that organizations must rely on internal mitigations, increasing operational overhead and risk exposure until a fix is available.
Mitigation Recommendations
1. Immediate mitigation should include implementing Web Application Firewall (WAF) rules to detect and block suspicious SQL injection patterns targeting the 'isAsc' parameter. 2. Conduct thorough input validation and sanitization on all user-supplied parameters, especially those controlling query logic such as sorting order. 3. Employ parameterized queries or prepared statements in the affected codebase to prevent injection attacks. 4. Restrict database user permissions to the minimum necessary to limit the impact of a successful injection. 5. Monitor application logs and database queries for anomalous activity indicative of injection attempts. 6. If possible, isolate or restrict access to the affected service from untrusted networks until a patch or update is available. 7. Engage with the ruoyi-go community or maintainers to track any forthcoming patches or official advisories. 8. Prepare incident response plans specific to SQL injection attacks, including data integrity verification and recovery procedures. These steps go beyond generic advice by focusing on the specific vulnerable parameter and the current lack of vendor remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-25T08:45:17.485Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ac9ab3ad5a09ad004deceb
Added to database: 8/25/2025, 5:17:39 PM
Last enriched: 8/25/2025, 5:33:04 PM
Last updated: 8/25/2025, 6:39:47 PM
Views: 4
Related Threats
Safeguarding VS Code against prompt injections
MediumCVE-2025-9415: Unrestricted Upload in GreenCMS
MediumCVE-2025-9414: Server-Side Request Forgery in kalcaddle kodbox
MediumCVE-2025-9413: SQL Injection in lostvip-com ruoyi-go
MediumCVE-2025-50383: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.