CVE-2025-8752

A vulnerability was found in wangzhixuan spring-shiro-training up to 94812c1fd8f7fe796c931f4984ff1aa0671ab562. It has been declared as critical. This vulnerability affects unknown code of the file /role/add. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
References
Link Resource
https://gitee.com/wangzhixuan/spring-shiro-training/issues/ICP2ME Exploit Vendor Advisory Issue Tracking
https://vuldb.com/?ctiid.319246 Permissions Required VDB Entry
https://vuldb.com/?id.319246 Third Party Advisory VDB Entry
https://vuldb.com/?submit.623679 Exploit Third Party Advisory VDB Entry
https://gitee.com/wangzhixuan/spring-shiro-training/issues/ICP2ME Exploit Vendor Advisory Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:xuanshao:spring-shiro-training:-:*:*:*:*:*:*:*

History

16 Sep 2025, 15:25

Type Values Removed Values Added
CPE cpe:2.3:a:xuanshao:spring-shiro-training:-:*:*:*:*:*:*:*
First Time Xuanshao spring-shiro-training
Xuanshao
References () https://gitee.com/wangzhixuan/spring-shiro-training/issues/ICP2ME - () https://gitee.com/wangzhixuan/spring-shiro-training/issues/ICP2ME - Exploit, Vendor Advisory, Issue Tracking
References () https://vuldb.com/?ctiid.319246 - () https://vuldb.com/?ctiid.319246 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.319246 - () https://vuldb.com/?id.319246 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.623679 - () https://vuldb.com/?submit.623679 - Exploit, Third Party Advisory, VDB Entry

11 Aug 2025, 17:15

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en wangzhixuan spring-shiro-training hasta 94812c1fd8f7fe796c931f4984ff1aa0671ab562. Se ha declarado crítica. Esta vulnerabilidad afecta a código desconocido del archivo /role/add. La manipulación provoca la inyección de comandos. El ataque puede iniciarse en remoto. Se ha hecho público el exploit y puede que sea utilizado. Este producto utiliza un sistema de entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas.
References () https://gitee.com/wangzhixuan/spring-shiro-training/issues/ICP2ME - () https://gitee.com/wangzhixuan/spring-shiro-training/issues/ICP2ME -

09 Aug 2025, 12:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-09 12:15

Updated : 2025-09-16 15:25


NVD link : CVE-2025-8752

Mitre link : CVE-2025-8752

CVE.ORG link : CVE-2025-8752


JSON object : View

Products Affected

xuanshao

  • spring-shiro-training
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')