Vulnerability Description
A vulnerability classified as problematic has been found in yangzongzhuan RuoYi up to 4.8.1. Affected is the function addSave of the file com/ruoyi/web/controller/system/SysNoticeController.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruoyi | Ruoyi | <= 4.8.1 |
Related Weaknesses (CWE)
References
- https://github.com/yangzongzhuan/RuoYi/issues/294Exploit
- https://github.com/yangzongzhuan/RuoYi/issues/294#issue-3211205807Exploit
- https://vuldb.com/?ctiid.317016Permissions RequiredVDB Entry
- https://vuldb.com/?id.317016Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.618354Third Party AdvisoryVDB Entry
- https://github.com/yangzongzhuan/RuoYi/issues/294Exploit
FAQ
What is CVE-2025-7902?
CVE-2025-7902 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability classified as problematic has been found in yangzongzhuan RuoYi up to 4.8.1. Affected is the function addSave of the file com/ruoyi/web/controller/system/SysNoticeController.java. The ...
How severe is CVE-2025-7902?
CVE-2025-7902 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-7902?
Check the references section above for vendor advisories and patch information. Affected products include: Ruoyi Ruoyi.