{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-0734","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-01-27T11:01:11.692Z","datePublished":"2025-01-27T19:00:12.136Z","dateUpdated":"2025-02-12T20:01:11.854Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-01-27T19:00:12.136Z"},"title":"y_project RuoYi Whitelist getBeanName deserialization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-502","lang":"en","description":"Deserialization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-20","lang":"en","description":"Improper Input Validation"}]}],"affected":[{"vendor":"y_project","product":"RuoYi","versions":[{"version":"4.0","status":"affected"},{"version":"4.1","status":"affected"},{"version":"4.2","status":"affected"},{"version":"4.3","status":"affected"},{"version":"4.4","status":"affected"},{"version":"4.5","status":"affected"},{"version":"4.6","status":"affected"},{"version":"4.7","status":"affected"},{"version":"4.8","status":"affected"}],"modules":["Whitelist"]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in y_project RuoYi up to 4.8.0 and classified as critical. This vulnerability affects the function getBeanName of the component Whitelist. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In y_project RuoYi bis 4.8.0 wurde eine kritische Schwachstelle gefunden. Betroffen ist die Funktion getBeanName der Komponente Whitelist. Durch Beeinflussen mit unbekannten Daten kann eine deserialization-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":4.7,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.7,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P"}}],"timeline":[{"time":"2025-01-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-01-27T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-01-27T12:06:20.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"GSBP (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.293512","name":"VDB-293512 | y_project RuoYi Whitelist getBeanName deserialization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.293512","name":"VDB-293512 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.482823","name":"Submit #482823 | RuoYi <= 4.8.0 could bypass white list to RCE or Arbitrary code execution","tags":["third-party-advisory"]},{"url":"https://gist.github.com/GSBP0/3c1b0f9dbdd2a48b8f52330cfbbc279b","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-0734","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2025-01-27T19:15:59.301741Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-12T20:01:11.854Z"}}]}}