First published: Wed Apr 13 2022(Updated: )
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. Gin-vue-admin 2.50 has arbitrary file read vulnerability due to a lack of parameter validation. This has been resolved in version 2.5.1. There are no known workarounds for this issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gin-vue-admin Project Gin-vue-admin | <2.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-24843.
The severity of CVE-2022-24843 is high with a CVSS score of 7.5.
Gin-vue-admin is a backstage management system based on Vue and Gin.
CVE-2022-24843 allows for arbitrary file read, which can lead to unauthorized access to sensitive information.
To fix CVE-2022-24843, update Gin-vue-admin to version 2.5.1 or later.