3.1
CVE-2025-15117
- EPSS 0.05%
- Veröffentlicht 28.12.2025 02:32:05
- Zuletzt bearbeitet 29.12.2025 15:57:37
- Quelle cna@vuldb.com
- CVE-Watchlists
- Unerledigt
A weakness has been identified in Dromara Sa-Token up to 1.44.0. This affects the function ObjectInputStream.readObject of the file SaJdkSerializer.java. Executing manipulation can lead to deserialization. The attack may be launched remotely. This attack is characterized by high complexity. It is indicated that the exploitability is difficult. The vendor was contacted early about this disclosure but did not respond in any way.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerDromara
≫
Produkt
Sa-Token
Version
1.0
Status
affected
Version
1.1
Status
affected
Version
1.2
Status
affected
Version
1.3
Status
affected
Version
1.4
Status
affected
Version
1.5
Status
affected
Version
1.6
Status
affected
Version
1.7
Status
affected
Version
1.8
Status
affected
Version
1.9
Status
affected
Version
1.10
Status
affected
Version
1.11
Status
affected
Version
1.12
Status
affected
Version
1.13
Status
affected
Version
1.14
Status
affected
Version
1.15
Status
affected
Version
1.16
Status
affected
Version
1.17
Status
affected
Version
1.18
Status
affected
Version
1.19
Status
affected
Version
1.20
Status
affected
Version
1.21
Status
affected
Version
1.22
Status
affected
Version
1.23
Status
affected
Version
1.24
Status
affected
Version
1.25
Status
affected
Version
1.26
Status
affected
Version
1.27
Status
affected
Version
1.28
Status
affected
Version
1.29
Status
affected
Version
1.30
Status
affected
Version
1.31
Status
affected
Version
1.32
Status
affected
Version
1.33
Status
affected
Version
1.34
Status
affected
Version
1.35
Status
affected
Version
1.36
Status
affected
Version
1.37
Status
affected
Version
1.38
Status
affected
Version
1.39
Status
affected
Version
1.40
Status
affected
Version
1.41
Status
affected
Version
1.42
Status
affected
Version
1.43
Status
affected
Version
1.44.0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.162 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| cna@vuldb.com | 3.1 | 1.6 | 1.4 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
|
| cna@vuldb.com | 2.3 | 0 | 0 |
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
| cna@vuldb.com | 2.1 | 3.9 | 2.9 |
AV:N/AC:H/Au:S/C:N/I:N/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.