{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9413","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-25T08:45:51.488Z","datePublished":"2025-08-25T18:02:08.185Z","dateUpdated":"2025-08-25T18:09:50.560Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-25T18:02:08.185Z"},"title":"lostvip-com ruoyi-go system_router.go SelectListByPage sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"lostvip-com","product":"ruoyi-go","versions":[{"version":"2.0","status":"affected"},{"version":"2.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A flaw has been found in lostvip-com ruoyi-go up to 2.1. This impacts the function SelectListByPage of the file modules/system/system_router.go. This manipulation of the argument orderByColumn/isAsc causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In lostvip-com ruoyi-go bis 2.1 wurde eine Schwachstelle gefunden. Betroffen davon ist die Funktion SelectListByPage der Datei modules/system/system_router.go. Durch Beeinflussen des Arguments orderByColumn/isAsc mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Die Ausnutzung wurde veröffentlicht und kann verwendet werden."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-25T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-25T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-25T10:51:27.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"OnTheWay (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.321254","name":"VDB-321254 | lostvip-com ruoyi-go system_router.go SelectListByPage sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.321254","name":"VDB-321254 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.633730","name":"Submit #633730 | GitHub ruoyi-go 2.1 SQL Injection","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.633731","name":"Submit #633731 | GitHub ruoyi-go 2.1 SQL Injection (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/on-theway/cve/issues/8","tags":["issue-tracking"]},{"url":"https://github.com/on-theway/cve/issues/9","tags":["exploit","issue-tracking"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-25T18:08:57.186608Z","id":"CVE-2025-9413","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-25T18:09:50.560Z"}}]}}