Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-4537
PUBLISHED
More InfoOfficial Page
Assigner-VulDB
Assigner Org ID-1af790b2-7ee1-4545-860a-a788eba489b5
View Known Exploited Vulnerability (KEV) details
Published At-11 May, 2025 | 09:31
Updated At-12 May, 2025 | 14:17
Rejected At-
▼CVE Numbering Authority (CNA)
yangzongzhuan RuoYi-Vue Password login.vue sensitive information in a cookie

A vulnerability was found in yangzongzhuan RuoYi-Vue up to 3.8.9 and classified as problematic. Affected by this issue is some unknown functionality of the file ruoyi-ui/jsencrypt.js and ruoyi-ui/login.vue of the component Password Handler. The manipulation leads to cleartext storage of sensitive information in a cookie. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.

Affected Products
Vendor
yangzongzhuan
Product
RuoYi-Vue
Modules
  • Password Handler
Versions
Affected
  • 3.8.0
  • 3.8.1
  • 3.8.2
  • 3.8.3
  • 3.8.4
  • 3.8.5
  • 3.8.6
  • 3.8.7
  • 3.8.8
  • 3.8.9
Problem Types
TypeCWE IDDescription
CWECWE-315Cleartext Storage of Sensitive Information in a Cookie
CWECWE-312Cleartext Storage of Sensitive Information
Type: CWE
CWE ID: CWE-315
Description: Cleartext Storage of Sensitive Information in a Cookie
Type: CWE
CWE ID: CWE-312
Description: Cleartext Storage of Sensitive Information
Metrics
VersionBase scoreBase severityVector
4.02.3LOW
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
3.13.1LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
3.03.1LOW
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
2.02.6N/A
AV:N/AC:H/Au:N/C:P/I:N/A:N
Version: 4.0
Base score: 2.3
Base severity: LOW
Vector:
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Version: 3.1
Base score: 3.1
Base severity: LOW
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Version: 3.0
Base score: 3.1
Base severity: LOW
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
Version: 2.0
Base score: 2.6
Base severity: N/A
Vector:
AV:N/AC:H/Au:N/C:P/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
s0l42 (VulDB User)
Timeline
EventDate
Advisory disclosed2025-05-10 00:00:00
VulDB entry created2025-05-10 02:00:00
VulDB entry last update2025-05-10 08:12:30
Event: Advisory disclosed
Date: 2025-05-10 00:00:00
Event: VulDB entry created
Date: 2025-05-10 02:00:00
Event: VulDB entry last update
Date: 2025-05-10 08:12:30
Replaced By

Rejected Reason

References
HyperlinkResource
https://vuldb.com/?id.308282
vdb-entry
https://vuldb.com/?ctiid.308282
signature
permissions-required
https://vuldb.com/?submit.566469
third-party-advisory
https://magnificent-dill-351.notion.site/Password-Disclosure-in-RuoYi-Vue-3-8-9-1e3c693918ed80ee9799f270c8346cd4
exploit
Hyperlink: https://vuldb.com/?id.308282
Resource:
vdb-entry
Hyperlink: https://vuldb.com/?ctiid.308282
Resource:
signature
permissions-required
Hyperlink: https://vuldb.com/?submit.566469
Resource:
third-party-advisory
Hyperlink: https://magnificent-dill-351.notion.site/Password-Disclosure-in-RuoYi-Vue-3-8-9-1e3c693918ed80ee9799f270c8346cd4
Resource:
exploit
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://magnificent-dill-351.notion.site/Password-Disclosure-in-RuoYi-Vue-3-8-9-1e3c693918ed80ee9799f270c8346cd4
exploit
Hyperlink: https://magnificent-dill-351.notion.site/Password-Disclosure-in-RuoYi-Vue-3-8-9-1e3c693918ed80ee9799f270c8346cd4
Resource:
exploit
Details not found