5
CVE-2025-15222
- EPSS 0.05%
- Veröffentlicht 30.12.2025 05:32:05
- Zuletzt bearbeitet 31.12.2025 20:43:25
- Quelle cna@vuldb.com
- CVE-Watchlists
- Unerledigt
A vulnerability has been found in Dromara Sa-Token up to 1.44.0. This issue affects the function ObjectInputStream.readObject of the file SaSerializerTemplateForJdkUseBase64.java. Such manipulation leads to deserialization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerDromara
≫
Produkt
Sa-Token
Version
1.0
Status
affected
Version
1.1
Status
affected
Version
1.2
Status
affected
Version
1.3
Status
affected
Version
1.4
Status
affected
Version
1.5
Status
affected
Version
1.6
Status
affected
Version
1.7
Status
affected
Version
1.8
Status
affected
Version
1.9
Status
affected
Version
1.10
Status
affected
Version
1.11
Status
affected
Version
1.12
Status
affected
Version
1.13
Status
affected
Version
1.14
Status
affected
Version
1.15
Status
affected
Version
1.16
Status
affected
Version
1.17
Status
affected
Version
1.18
Status
affected
Version
1.19
Status
affected
Version
1.20
Status
affected
Version
1.21
Status
affected
Version
1.22
Status
affected
Version
1.23
Status
affected
Version
1.24
Status
affected
Version
1.25
Status
affected
Version
1.26
Status
affected
Version
1.27
Status
affected
Version
1.28
Status
affected
Version
1.29
Status
affected
Version
1.30
Status
affected
Version
1.31
Status
affected
Version
1.32
Status
affected
Version
1.33
Status
affected
Version
1.34
Status
affected
Version
1.35
Status
affected
Version
1.36
Status
affected
Version
1.37
Status
affected
Version
1.38
Status
affected
Version
1.39
Status
affected
Version
1.40
Status
affected
Version
1.41
Status
affected
Version
1.42
Status
affected
Version
1.43
Status
affected
Version
1.44.0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.162 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| cna@vuldb.com | 5 | 1.6 | 3.4 |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
|
| cna@vuldb.com | 2.3 | 0 | 0 |
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
| cna@vuldb.com | 4.6 | 3.9 | 6.4 |
AV:N/AC:H/Au:S/C:P/I:P/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.