-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability description explicitly identifies uploadFilesPath as the vulnerable function handling file uploads. The XSS occurs because user-controlled originalFilenames parameter values are rendered in the UI without proper sanitization. This matches the CWE-79 pattern of improper input neutralization during web page generation. The Gitee issue discussion about filename reflection confirms the attack vector. While exact line numbers aren't available, the component context (File Upload) and parameter name (originalFilenames) strongly indicate insecure handling of user-controlled filename values in this controller method.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| com.ruoyi:ruoyi | maven | <= 4.7.7 |
KEV Misses 88% of Exploited CVEs- Get the report