First published: Fri Mar 14 2025(Updated: )
A vulnerability has been found in 274056675 springboot-openai-chatgpt e84f6f5 and classified as critical. Affected by this vulnerability is the function submit of the file /api/blade-user/submit of the component User Handler. The manipulation leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Spring Boot OpenAI ChatGPT |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2320 is classified as a critical vulnerability.
To resolve CVE-2025-2320, you should apply the latest security patches provided for the springboot-openai-chatgpt component.
CVE-2025-2320 can lead to improper authorization allowing unauthorized access to the function submit in the User Handler.
CVE-2025-2320 affects the springboot-openai-chatgpt software, specifically in its User Handler component.
The involved component in CVE-2025-2320 is the User Handler, particularly the submit function located in /api/blade-user/submit.