First published: Sat Mar 15 2025(Updated: )
A vulnerability was found in 274056675 springboot-openai-chatgpt e84f6f5. It has been declared as problematic. This vulnerability affects the function updateQuestionCou of the file /api/mjkj-chat/chat/mng/update/questionCou of the component Number of Question Handler. The manipulation leads to enforcement of behavioral workflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Spring Boot OpenAI ChatGPT |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-2323 is classified as a problematic vulnerability affecting the Spring Boot OpenAI ChatGPT application.
To fix CVE-2025-2323, apply the latest security patches provided by the Spring Boot OpenAI ChatGPT vendor.
CVE-2025-2323 affects the Number of Question Handler component in the Spring Boot OpenAI ChatGPT application.
The updateQuestionCou function in the Spring Boot OpenAI ChatGPT application is vulnerable as per CVE-2025-2323.
Attackers can manipulate the updateQuestionCou function, leading to potential exploitation of the Spring Boot OpenAI ChatGPT application.