CVE-2025-3413

A vulnerability has been found in opplus springboot-admin up to a2d5310f44fd46780a8686456cf2f9001ab8f024 and classified as critical. Affected by this vulnerability is the function code of the file SysGeneratorController.java. The manipulation of the argument Tables leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/mapl3miss/Vul/blob/main/Vul.md Broken Link
https://vuldb.com/?ctiid.303691 Permissions Required VDB Entry
https://vuldb.com/?id.303691 Third Party Advisory VDB Entry
https://vuldb.com/?submit.545374 Third Party Advisory VDB Entry
https://github.com/mapl3miss/Vul/blob/main/Vul.md Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:opplus:springboot-admin:*:*:*:*:*:*:*:*

History

16 Oct 2025, 15:09

Type Values Removed Values Added
CPE cpe:2.3:a:opplus:springboot-admin:*:*:*:*:*:*:*:*
References () https://github.com/mapl3miss/Vul/blob/main/Vul.md - () https://github.com/mapl3miss/Vul/blob/main/Vul.md - Broken Link
References () https://vuldb.com/?ctiid.303691 - () https://vuldb.com/?ctiid.303691 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.303691 - () https://vuldb.com/?id.303691 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.545374 - () https://vuldb.com/?submit.545374 - Third Party Advisory, VDB Entry
First Time Opplus
Opplus springboot-admin

08 Apr 2025, 16:15

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad en opplus springboot-admin hasta a2d5310f44fd46780a8686456cf2f9001ab8f024, clasificada como crítica. Esta vulnerabilidad afecta al código de función del archivo SysGeneratorController.java. La manipulación del argumento "Tables" provoca la deserialización. El ataque puede ejecutarse remotamente. Se ha hecho público el exploit y puede que sea utilizado. Este producto no utiliza control de versiones. Por ello, no hay información disponible sobre las versiones afectadas y no afectadas. Se contactó al proveedor con antelación para informarle sobre esta divulgación, pero no respondió.
References () https://github.com/mapl3miss/Vul/blob/main/Vul.md - () https://github.com/mapl3miss/Vul/blob/main/Vul.md -

08 Apr 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-08 06:15

Updated : 2025-10-16 15:09


NVD link : CVE-2025-3413

Mitre link : CVE-2025-3413

CVE.ORG link : CVE-2025-3413


JSON object : View

Products Affected

opplus

  • springboot-admin
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data