Submit #710152: Ruoyi Management System V4.8.1 Code Injectioninfo

TitelRuoyi Management System V4.8.1 Code Injection
BeschreibungThe vulnerability exists in the CacheController at the '/monitor/cache/getnames' endpoint, where the fragment parameter does not adequately sanitize user input. This allows attackers to inject malicious code via carefully crafted Thymeleaf expressions. Although newer versions have implemented blacklist filtering, attackers can still bypass restrictions using specific formats (such as __|$${...}|__::.x) to achieve code execution.
Quelle⚠️ https://github.com/ltranquility/CVE/issues/26
Benutzer
 Customer (UID 83474)
Einreichung09.12.2025 10:01 (vor 4 Monaten)
Moderieren17.12.2025 21:59 (8 days later)
StatusAkzeptiert
VulDB Eintrag337047 [y_project RuoYi bis 4.8.1 /monitor/cache/getnames fragment erweiterte Rechte]
Punkte20

Do you want to use VulDB in your project?

Use the official API to access entries easily!