{"id":"CVE-2023-27025","details":"An arbitrary file download vulnerability in the background management module of RuoYi v4.7.6 and below allows attackers to download arbitrary files in the server.","aliases":["GHSA-h4c9-rr5m-32fm"],"modified":"2026-04-10T04:56:33.750738Z","published":"2023-04-02T01:15:07.400Z","references":[{"type":"REPORT","url":"https://gitee.com/y_project/RuoYi/commit/432d5ce1be2e9384a6230d7ccd8401eef5ce02b0"},{"type":"REPORT","url":"https://gitee.com/y_project/RuoYi/issues/I697Q5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/yangzongzhuan/ruoyi","events":[{"introduced":"0"},{"last_affected":"9d02f8f7e7220c57a8432365c59bc1cc5a228455"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.7.6"}]}}],"versions":["v2.2","v2.3","v2.4","v3.1","v3.2","v3.3","v3.4","v4.0","v4.1","v4.2","v4.3","v4.3.1","v4.4","v4.5.0","v4.5.1","v4.6.0","v4.6.1","v4.6.2","v4.7.0","v4.7.1","v4.7.2","v4.7.3","v4.7.4","v4.7.5","v4.7.6"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-27025.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}