3.1

CVE-2025-15117

A weakness has been identified in Dromara Sa-Token up to 1.44.0. This affects the function ObjectInputStream.readObject of the file SaJdkSerializer.java. Executing manipulation can lead to deserialization. The attack may be launched remotely. This attack is characterized by high complexity. It is indicated that the exploitability is difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerDromara
Produkt Sa-Token
Version 1.0
Status affected
Version 1.1
Status affected
Version 1.2
Status affected
Version 1.3
Status affected
Version 1.4
Status affected
Version 1.5
Status affected
Version 1.6
Status affected
Version 1.7
Status affected
Version 1.8
Status affected
Version 1.9
Status affected
Version 1.10
Status affected
Version 1.11
Status affected
Version 1.12
Status affected
Version 1.13
Status affected
Version 1.14
Status affected
Version 1.15
Status affected
Version 1.16
Status affected
Version 1.17
Status affected
Version 1.18
Status affected
Version 1.19
Status affected
Version 1.20
Status affected
Version 1.21
Status affected
Version 1.22
Status affected
Version 1.23
Status affected
Version 1.24
Status affected
Version 1.25
Status affected
Version 1.26
Status affected
Version 1.27
Status affected
Version 1.28
Status affected
Version 1.29
Status affected
Version 1.30
Status affected
Version 1.31
Status affected
Version 1.32
Status affected
Version 1.33
Status affected
Version 1.34
Status affected
Version 1.35
Status affected
Version 1.36
Status affected
Version 1.37
Status affected
Version 1.38
Status affected
Version 1.39
Status affected
Version 1.40
Status affected
Version 1.41
Status affected
Version 1.42
Status affected
Version 1.43
Status affected
Version 1.44.0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.162
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
cna@vuldb.com 3.1 1.6 1.4
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
cna@vuldb.com 2.3 0 0
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
cna@vuldb.com 2.1 3.9 2.9
AV:N/AC:H/Au:S/C:N/I:N/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-502 Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.