First published: Tue Apr 08 2025(Updated: )
A vulnerability has been found in opplus springboot-admin up to a2d5310f44fd46780a8686456cf2f9001ab8f024 and classified as critical. Affected by this vulnerability is the function code of the file SysGeneratorController.java. The manipulation of the argument Tables leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Spring Boot Admin | <=a2d5310f44fd46780a8686456cf2f9001ab8f024 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3413 is classified as critical due to its potential impact.
To mitigate CVE-2025-3413, update opplus springboot-admin to a version newer than a2d5310f44fd46780a8686456cf2f9001ab8f024.
CVE-2025-3413 could lead to deserialization vulnerabilities that may allow an attacker to execute arbitrary code.
CVE-2025-3413 affects versions of opplus springboot-admin up to a2d5310f44fd46780a8686456cf2f9001ab8f024.
The vulnerable component in CVE-2025-3413 is the SysGeneratorController.java function.