CVE-2025-3413

A vulnerability has been found in opplus springboot-admin up to a2d5310f44fd46780a8686456cf2f9001ab8f024 and classified as critical. Affected by this vulnerability is the function code of the file SysGeneratorController.java. The manipulation of the argument Tables leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/mapl3miss/Vul/blob/main/Vul.md Broken Link
https://vuldb.com/?ctiid.303691 Permissions Required VDB Entry
https://vuldb.com/?id.303691 Third Party Advisory VDB Entry
https://vuldb.com/?submit.545374 Third Party Advisory VDB Entry
https://github.com/mapl3miss/Vul/blob/main/Vul.md Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:opplus:springboot-admin:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-04-08 06:15

Updated : 2025-10-16 15:09


NVD link : CVE-2025-3413

Mitre link : CVE-2025-3413

CVE.ORG link : CVE-2025-3413


JSON object : View

Products Affected

opplus

  • springboot-admin
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data