CVE-2025-3202

HIGH

Ageerle Ruoyi-ai < 2.0.1 - Improper Authorization

Title source: rule
STIX 2.1

Description

A vulnerability classified as critical has been found in ageerle ruoyi-ai up to 2.0.0. Affected is an unknown function of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/controller/system/SysNoticeController.java. The manipulation leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is 6382e177bf90cc56ff70521842409e35c50df32d. It is recommended to upgrade the affected component.

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
https://vuldb.com/?id.303156
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.303156
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.545866
Exploit, Issue Tracking exploit issue-tracking
https://github.com/ageerle/ruoyi-ai/issues/44#issue-2957771318

Scores

CVSS v3 7.3
EPSS 0.0037
EPSS Percentile 58.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-266 CWE-285
Status published
Products (1)
ageerle/ruoyi-ai < 2.0.1
Published Apr 04, 2025
Tracked Since Feb 18, 2026