A security vulnerability has been detected in y_project RuoYi up to 4.8.1. The affected element is an unknown function of the file /monitor/cache/getnames. Such manipulation of the argument fragment leads to code injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/ltranquility/CVE/issues/26 | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.337047 | Permissions Required VDB Entry |
| https://vuldb.com/?id.337047 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.710152 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-12-18 02:15
Updated : 2025-12-30 18:27
NVD link : CVE-2025-14856
Mitre link : CVE-2025-14856
CVE.ORG link : CVE-2025-14856
JSON object : View
Products Affected
ruoyi
- ruoyi
