Impact
The vulnerability resides in the SaServletFilter component of the Workflow Module; by manipulating the /workflow/instance/deleteByInstanceIds endpoint an attacker can bypass authorization and delete workflow instances without permission, potentially causing data loss and business process disruption. The flaw is a broken access control deficiency (CWE‑862) and other access control issue (CWE‑863).
Affected Systems
Affected products are the Dromara RuoYi‑Vue‑Plus workflow module up to version 5.5.3. Any deployment of this software that relies on the SaServletFilter for the /workflow/instance/deleteByInstanceIds endpoint is impacted. No other versions have been confirmed as affected.
Risk and Exploitability
CVSS score 5.3 indicates moderate severity; EPSS <1% suggests very low current exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. However, the exploit is publicly available and can be triggered remotely through standard HTTP requests. Lack of an official fix means the risk remains until a vendor patch or a workaround is applied.
OpenCVE Enrichment