{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-10989","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-09-25T17:14:33.456Z","datePublished":"2025-09-26T00:32:10.683Z","dateUpdated":"2025-09-26T15:17:38.723Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-09-26T00:32:10.683Z"},"title":"yangzongzhuan RuoYi selectAll improper authorization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-285","lang":"en","description":"Improper Authorization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"yangzongzhuan","product":"RuoYi","versions":[{"version":"4.8.0","status":"affected"},{"version":"4.8.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in yangzongzhuan RuoYi up to 4.8.1. This vulnerability affects unknown code of the file /system/role/authUser/selectAll. Performing manipulation of the argument userIds results in improper authorization. The attack can be initiated remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in yangzongzhuan RuoYi up to 4.8.1 gefunden. Hierbei betrifft es unbekannten Programmcode der Datei /system/role/authUser/selectAll. Mittels Manipulieren des Arguments userIds mit unbekannten Daten kann eine improper authorization-Schwachstelle ausgenutzt werden. Der Angriff lässt sich über das Netzwerk starten. Die Schwachstelle wurde öffentlich offengelegt und könnte ausgenutzt werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-09-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-09-25T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-09-25T19:19:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"aibot888 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.325912","name":"VDB-325912 | yangzongzhuan RuoYi selectAll improper authorization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.325912","name":"VDB-325912 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.653737","name":"Submit #653737 | yangzongzhuan RuoYi latest broken function level authorization","tags":["third-party-advisory"]},{"url":"https://www.cnblogs.com/aibot/p/19063507","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-26T15:17:31.100326Z","id":"CVE-2025-10989","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-26T15:17:38.723Z"}}]}}