{"id":"CVE-2023-49371","details":"RuoYi up to v4.6 was discovered to contain a SQL injection vulnerability via /system/dept/edit.","aliases":["GHSA-fg29-37px-c7wm"],"modified":"2026-04-10T05:05:02.713806Z","published":"2023-12-01T15:15:07.817Z","references":[{"type":"ADVISORY","url":"https://gist.github.com/Maverickfir/53405b944b2830b43a84abf4b1734847"},{"type":"EVIDENCE","url":"https://github.com/Maverickfir/RuoYi-v4.6-vulnerability/blob/main/Ruoyiv4.6.md"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/yangzongzhuan/ruoyi","events":[{"introduced":"0"},{"last_affected":"3faa23b7c0c1b780d6284e9bfad18378dc77798a"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.6.0"}]}}],"versions":["v2.2","v2.3","v2.4","v3.1","v3.2","v3.3","v3.4","v4.0","v4.1","v4.2","v4.3","v4.3.1","v4.4","v4.5.0","v4.5.1","v4.6.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-49371.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}