A vulnerability was found in ageerle ruoyi-ai 2.0.0 and classified as critical. Affected by this issue is the function speechToTextTranscriptionsV2/upload of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/service/impl/SseServiceImpl.java. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as 4e93ac86d4891c59ecfcd27c051de9b3c5379315. It is recommended to upgrade the affected component.
Metrics
Affected Vendors & Products
References
History
Sun, 22 Jun 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in ageerle ruoyi-ai 2.0.0 and classified as critical. Affected by this issue is the function speechToTextTranscriptionsV2/upload of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/service/impl/SseServiceImpl.java. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as 4e93ac86d4891c59ecfcd27c051de9b3c5379315. It is recommended to upgrade the affected component. | |
Title | ageerle ruoyi-ai SseServiceImpl.java upload unrestricted upload | |
Weaknesses | CWE-284 CWE-434 |
|
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-06-22T05:00:14.279Z
Updated: 2025-06-22T05:00:14.279Z
Reserved: 2025-06-21T05:12:30.328Z
Link: CVE-2025-6466

No data.

Status : Received
Published: 2025-06-22T05:15:25.840
Modified: 2025-06-22T05:15:25.840
Link: CVE-2025-6466

No data.