CVE-2025-6466

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-6466
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-6466.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-6466
Published
2025-06-22T05:15:25Z
Modified
2025-06-27T03:27:55Z
Summary
[none]
Details

A vulnerability was found in ageerle ruoyi-ai 2.0.0 and classified as critical. Affected by this issue is the function speechToTextTranscriptionsV2/upload of the file ruoyi-modules/ruoyi-system/src/main/java/org/ruoyi/system/service/impl/SseServiceImpl.java. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.1 is able to address this issue. The patch is identified as 4e93ac86d4891c59ecfcd27c051de9b3c5379315. It is recommended to upgrade the affected component.

References

Affected packages

Git / github.com/ageerle/ruoyi-ai

Affected ranges

Type
GIT
Repo
https://github.com/ageerle/ruoyi-ai
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed