Submit #710152: Ruoyi Management System V4.8.1 Code Injectioninfo

TitleRuoyi Management System V4.8.1 Code Injection
DescriptionThe vulnerability exists in the CacheController at the '/monitor/cache/getnames' endpoint, where the fragment parameter does not adequately sanitize user input. This allows attackers to inject malicious code via carefully crafted Thymeleaf expressions. Although newer versions have implemented blacklist filtering, attackers can still bypass restrictions using specific formats (such as __|$${...}|__::.x) to achieve code execution.
Source⚠️ https://github.com/ltranquility/CVE/issues/26
User
 Customer (UID 83474)
Submission12/09/2025 10:01 (4 months ago)
Moderation12/17/2025 21:59 (8 days later)
StatusAccepted
VulDB entry337047 [y_project RuoYi up to 4.8.1 /monitor/cache/getnames fragment code injection]
Points20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!