CVE-2025-7907

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-7907
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-7907.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-7907
Published
2025-07-20T21:15:23Z
Modified
2025-08-09T14:48:13.022588Z
Summary
[none]
Details

A vulnerability was found in yangzongzhuan RuoYi up to 4.8.1. It has been classified as problematic. Affected is an unknown function of the file ruoyi-admin/src/main/resources/application-druid.yml of the component Druid. The manipulation leads to use of default credentials. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

References

Affected packages

Git / github.com/yangzongzhuan/ruoyi

Affected ranges

Type
GIT
Repo
https://github.com/yangzongzhuan/ruoyi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v2.*

v2.2
v2.3
v2.4

v3.*

v3.0
v3.1
v3.2
v3.3
v3.4

v4.*

v4.0
v4.1
v4.2
v4.3
v4.3.1
v4.4
v4.5.0
v4.5.1
v4.6.0
v4.6.1
v4.6.2
v4.7.0
v4.7.1
v4.7.2
v4.7.3
v4.7.4
v4.7.5
v4.7.6
v4.7.7
v4.7.8
v4.7.9
v4.8.0
v4.8.1