← Back to CVEs
CVE-2025-15222
MEDIUM5.0
Description
A vulnerability has been found in Dromara Sa-Token up to 1.44.0. This issue affects the function ObjectInputStream.readObject of the file SaSerializerTemplateForJdkUseBase64.java. Such manipulation leads to deserialization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE Details
CVSS v3.1 Score5.0
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredLOW
User InteractionNONE
Published12/30/2025
Last Modified12/31/2025
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-20CWE-502
References
https://github.com/Yohane-Mashiro/satoken-deserialization(cna@vuldb.com)
https://vuldb.com/?ctiid.338607(cna@vuldb.com)
https://vuldb.com/?id.338607(cna@vuldb.com)
https://vuldb.com/?submit.717703(cna@vuldb.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.