CVE-2025-28401

6.7 MEDIUM

📋 TL;DR

A privilege escalation vulnerability in RUoYi v.4.8.0 allows remote attackers to gain elevated privileges by manipulating the menuId parameter. This affects systems running the vulnerable version of RUoYi, potentially enabling unauthorized access to administrative functions.

💻 Affected Systems

Products:
  • RUoYi
Versions: v.4.8.0
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects RUoYi version 4.8.0 specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where an attacker gains administrative control, accesses sensitive data, and executes arbitrary commands.

🟠

Likely Case

Unauthorized privilege escalation allowing access to restricted administrative functions and data.

🟢

If Mitigated

Limited impact with proper access controls and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via parameter manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v.4.8.1 or later

Vendor Advisory: https://github.com/yangzongzhuan/RuoYi

Restart Required: Yes

Instructions:

1. Backup current installation. 2. Download latest version from GitHub. 3. Replace vulnerable files. 4. Restart application server.

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation for menuId parameter to prevent unauthorized values.

Implement parameter validation in controller layer

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles
  • Monitor and audit all privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check application version in configuration files or admin panel.

Check Version:

Check ruoyi-admin/src/main/resources/application.yml for version info

Verify Fix Applied:

Verify version is updated to 4.8.1+ and test menuId parameter validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • Multiple failed authentication followed by success

Network Indicators:

  • Suspicious parameter manipulation in HTTP requests

SIEM Query:

source="web_logs" AND (menuId="*" OR privilege="escalate")

🔗 References

📤 Share & Export