| Title | GitHub ruoyi-go 2.1 SQL Injection |
|---|
| Description | Ruoyi Background Management System (Golang version), based on gin + gorm, supports MyBatis-style separation of SQL and Go code. It features an extremely concise code style and adopts traditional template engine technology, making it suitable for back-end developers to work on a project independently. The lack of any filtering and parameter restrictions on data queries has led to SQL injection vulnerabilities. |
|---|
| Source | ⚠️ https://github.com/on-theway/cve/issues/5 |
|---|
| User | OnTheWay (UID 88937) |
|---|
| Submission | 08/13/2025 15:58 (8 months ago) |
|---|
| Moderation | 08/25/2025 10:45 (12 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 321252 [lostvip-com ruoyi-go up to 2.1 LoginInforService.go SelectPageList isAsc sql injection] |
|---|
| Points | 20 |
|---|