{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2819","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-19T17:12:58.633Z","datePublished":"2026-02-20T01:32:06.214Z","dateUpdated":"2026-02-23T19:00:57.578Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T10:29:51.667Z"},"title":"Dromara RuoYi-Vue-Plus Workflow deleteByInstanceIds SaServletFilter authorization","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-862","lang":"en","description":"Missing Authorization"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-863","lang":"en","description":"Incorrect Authorization"}]}],"affected":[{"vendor":"Dromara","product":"RuoYi-Vue-Plus","versions":[{"version":"5.5.0","status":"affected"},{"version":"5.5.1","status":"affected"},{"version":"5.5.2","status":"affected"},{"version":"5.5.3","status":"affected"}],"cpes":["cpe:2.3:a:dromara:ruoyi-vue-plus:*:*:*:*:*:*:*:*"],"modules":["Workflow Module"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in Dromara RuoYi-Vue-Plus up to 5.5.3. This vulnerability affects the function SaServletFilter of the file /workflow/instance/deleteByInstanceIds of the component Workflow Module. The manipulation leads to missing authorization. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-19T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-19T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-22T07:44:52.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"feng123123 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.346944","name":"VDB-346944 | Dromara RuoYi-Vue-Plus Workflow deleteByInstanceIds SaServletFilter authorization","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.346944","name":"VDB-346944 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.753321","name":"Submit #753321 | Dromara RuoYi-Vue-Plus 5.5.3 Privilege Escalation","tags":["third-party-advisory"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-23T19:00:43.722153Z","id":"CVE-2026-2819","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-23T19:00:57.578Z"}}]}}