logo

CVE-2023-27025 com.ruoyi:ruoyi

Package

Manager: maven
Name: com.ruoyi:ruoyi
Vulnerable Version: >=0 <4.7.7

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00066 pctl0.20954

Details

RuoYi vulnerable to arbitrary file download An arbitrary file download vulnerability in the background management module of RuoYi v4.7.6 and below allows attackers to download arbitrary files in the server.

Metadata

Created: 2023-04-02T03:30:16Z
Modified: 2025-07-16T19:24:22Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-h4c9-rr5m-32fm/GHSA-h4c9-rr5m-32fm.json
CWE IDs: ["CWE-494"]
Alternative ID: GHSA-h4c9-rr5m-32fm
Finding: F086
Auto approve: 1