5

CVE-2025-15222

Exploit
A vulnerability has been found in Dromara Sa-Token up to 1.44.0. This issue affects the function ObjectInputStream.readObject of the file SaSerializerTemplateForJdkUseBase64.java. Such manipulation leads to deserialization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerDromara
Produkt Sa-Token
Version 1.0
Status affected
Version 1.1
Status affected
Version 1.2
Status affected
Version 1.3
Status affected
Version 1.4
Status affected
Version 1.5
Status affected
Version 1.6
Status affected
Version 1.7
Status affected
Version 1.8
Status affected
Version 1.9
Status affected
Version 1.10
Status affected
Version 1.11
Status affected
Version 1.12
Status affected
Version 1.13
Status affected
Version 1.14
Status affected
Version 1.15
Status affected
Version 1.16
Status affected
Version 1.17
Status affected
Version 1.18
Status affected
Version 1.19
Status affected
Version 1.20
Status affected
Version 1.21
Status affected
Version 1.22
Status affected
Version 1.23
Status affected
Version 1.24
Status affected
Version 1.25
Status affected
Version 1.26
Status affected
Version 1.27
Status affected
Version 1.28
Status affected
Version 1.29
Status affected
Version 1.30
Status affected
Version 1.31
Status affected
Version 1.32
Status affected
Version 1.33
Status affected
Version 1.34
Status affected
Version 1.35
Status affected
Version 1.36
Status affected
Version 1.37
Status affected
Version 1.38
Status affected
Version 1.39
Status affected
Version 1.40
Status affected
Version 1.41
Status affected
Version 1.42
Status affected
Version 1.43
Status affected
Version 1.44.0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.162
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
cna@vuldb.com 5 1.6 3.4
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
cna@vuldb.com 2.3 0 0
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
cna@vuldb.com 4.6 3.9 6.4
AV:N/AC:H/Au:S/C:P/I:P/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-502 Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.