Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2819: Missing Authorization in Dromara RuoYi-Vue-Plus

0
Medium
VulnerabilityCVE-2026-2819cvecve-2026-2819
Published: Fri Feb 20 2026 (02/20/2026, 01:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Dromara
Product: RuoYi-Vue-Plus

Description

CVE-2026-2819 is a medium severity vulnerability in Dromara RuoYi-Vue-Plus versions up to 5. 5. 3, specifically affecting the Workflow Module's SaServletFilter function at the /workflow/instance/deleteByInstanceIds endpoint. The flaw results in missing authorization, allowing remote attackers to potentially delete workflow instances without proper permission. Exploitation does not require user interaction but does require low-level privileges. Although an exploit is publicly available, there are no confirmed reports of active exploitation in the wild. The vendor has not responded to disclosure attempts, and no official patch is currently available. Organizations using affected versions should prioritize implementing compensating controls and monitoring for suspicious activity. This vulnerability primarily impacts environments where RuoYi-Vue-Plus is deployed, notably in China and countries with significant adoption of this open-source framework. Given the medium CVSS score of 5.

AI-Powered Analysis

AILast updated: 02/20/2026, 02:32:01 UTC

Technical Analysis

CVE-2026-2819 is a vulnerability identified in the open-source project Dromara RuoYi-Vue-Plus, a popular Java-based rapid development framework that integrates Vue.js for frontend and Spring Boot for backend services. The vulnerability resides in the Workflow Module, specifically within the SaServletFilter function that handles requests to the /workflow/instance/deleteByInstanceIds endpoint. This endpoint is intended to delete workflow instances by their IDs. Due to missing authorization checks, an attacker with low privileges can remotely invoke this endpoint to delete workflow instances without proper permission validation. The vulnerability does not require user interaction and can be exploited over the network. The CVSS 4.0 vector indicates no user interaction (UI:N), no privileges required (PR:L - low privileges), and low attack complexity (AC:L). The impact includes partial loss of confidentiality, integrity, and availability, as unauthorized deletion of workflow instances can disrupt business processes and potentially expose sensitive workflow data. Although an exploit is publicly available, no active exploitation has been reported. The vendor was notified early but has not issued a patch or response, leaving users exposed. The lack of patch and vendor engagement increases the risk for organizations relying on this framework. The vulnerability affects versions 5.5.0 through 5.5.3, which are widely used in enterprise applications in China and other regions adopting this framework for rapid application development.

Potential Impact

The primary impact of CVE-2026-2819 is unauthorized deletion of workflow instances, which can disrupt critical business processes and lead to data loss or corruption. Organizations relying on RuoYi-Vue-Plus for workflow management may experience operational downtime, loss of audit trails, and potential compliance violations due to unauthorized data manipulation. The vulnerability allows attackers with low privileges to escalate their impact by bypassing authorization controls, potentially enabling further lateral movement or privilege escalation within the affected environment. Although the confidentiality impact is limited, integrity and availability impacts are significant, as workflow data integrity is compromised and availability of workflow services may be disrupted. The absence of vendor patches and the availability of public exploits increase the likelihood of exploitation, especially in environments where compensating controls are not in place. This could lead to reputational damage, financial losses, and increased incident response costs for affected organizations.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the /workflow/instance/deleteByInstanceIds endpoint via network-level controls such as firewalls or API gateways, limiting exposure to trusted internal networks only. 2. Implement strict role-based access control (RBAC) and verify that only authorized users can invoke sensitive workflow deletion operations, even if the application lacks built-in authorization checks. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized requests targeting this endpoint. 4. Monitor logs and audit trails for unusual deletion requests or patterns indicative of exploitation attempts. 5. If possible, upgrade to a version of RuoYi-Vue-Plus that addresses this vulnerability once released, or apply vendor-provided patches promptly. 6. In the absence of official patches, consider contributing or applying community-developed fixes or workarounds to enforce authorization checks at the application level. 7. Conduct security reviews and penetration tests focusing on authorization controls within the workflow module to identify and remediate similar issues. 8. Educate developers and administrators about the risks of missing authorization and enforce secure coding practices to prevent recurrence.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-19T17:12:58.633Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6997c421d7880ec89b4b3328

Added to database: 2/20/2026, 2:17:05 AM

Last enriched: 2/20/2026, 2:32:01 AM

Last updated: 2/20/2026, 4:31:43 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats