| Title | yangzongzhuan RuoYi <=4.8.1 cross site scripting |
|---|
| Description | A stored Cross-Site Scripting (XSS) vulnerability exists in the `/system/notice/edit` route of the affected application, specifically in the `editSave` method handling this endpoint. The application fails to properly sanitize user-supplied input before storing it into the backend database. As a result, malicious payloads submitted by attackers are persistently stored and subsequently executed in the browser context of users accessing the relevant functionality. |
|---|
| Source | ⚠️ https://github.com/yangzongzhuan/RuoYi/issues/298 |
|---|
| User | ez-lbz (UID 87033) |
|---|
| Submission | 07/26/2025 10:53 (9 months ago) |
|---|
| Moderation | 08/10/2025 17:59 (15 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 319381 [yangzongzhuan RuoYi up to 4.8.1 /system/notice/edit noticeTitle/noticeContent cross site scripting] |
|---|
| Points | 20 |
|---|