漏洞描述 RuleApi是一款基于typecho正式版数据库,使用JAVA语言Springboot框架,整合redis缓存数据库,COS、OSS对象存储的API程序。RuleApi在V1.0.0 bate及以后版本中存在管理中心默认key 123456,攻击者可利用默认key登录管理后台修改系统设置,后台设置中存在Mysql、Redis用户密码,COS SecretKey等配置信息泄露。
相关漏洞推荐 WordPress Plugin Alone Theme /wp-admin/admin-ajax.php beplus_import_pack_install_plugin 文件上传漏洞(CVE-2025-5394) WordPress Time Clock 插件 /wp-admin/admin-ajax.php 代码执行漏洞 (CVE-2024-9593) WordPress Ditty /wp-json/dittyeditor/v1/displayItems 服务器端请求伪造漏洞 WordPress AI Engine /wp-json/mcp/v1 信息泄露漏洞(CVE-2025-11749) WordPress wp-event-solution 插件 /wp-admin/admin-ajax.php 文件读取漏洞(CVE-2025-47445) POC CVE-2019-17671: WordPress <= 5.2.4 - Unauthenticated View Private/Draft Posts POC CVE-2024-39646: WordPress Custom 404 Pro <= 3.11.1 - Reflected XSS POC CVE-2024-6220: WordPress Keydatas ≤ 2.5.2 - Arbitrary File Upload POC CVE-2025-47445: WordPress Eventin (Themewinter) ≤ 4.0.26 - Arbitrary File Download POC wp-easy-google-fonts-log-disclosure: WordPress Easy Google Fonts - Error Log Disclosure POC wp-importer-log-disclosure: WordPress Importer - Error Log Disclosure POC wp-buddypress-open-redirect: WordPress BuddyPress < 2.9.2 - Authenticated Open Redirect POC wp-woocommerce-admin-fpd: WordPress Plugin WooCommerce Admin (woocommerce-admin) Full Path Disclosure