A vulnerability was found in wangzhixuan spring-shiro-training up to 94812c1fd8f7fe796c931f4984ff1aa0671ab562. It has been declared as critical. This vulnerability affects unknown code of the file /role/add. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
Metrics
Affected Vendors & Products
References
History
Sat, 09 Aug 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability was found in wangzhixuan spring-shiro-training up to 94812c1fd8f7fe796c931f4984ff1aa0671ab562. It has been declared as critical. This vulnerability affects unknown code of the file /role/add. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. | |
Title | wangzhixuan spring-shiro-training add command injection | |
Weaknesses | CWE-74 CWE-77 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-08-09T12:02:10.294Z
Updated: 2025-08-09T12:02:10.294Z
Reserved: 2025-08-08T11:45:12.411Z
Link: CVE-2025-8752

No data.

Status : Received
Published: 2025-08-09T12:15:25.753
Modified: 2025-08-09T12:15:25.753
Link: CVE-2025-8752

No data.