CVE-2025-10822
BaseFortify
Publication date: 2025-09-23
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fuyang_lipengjun | platform | 1.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-10822 is a broken function level authorization vulnerability in the fuyang_lipengjun platform version 1.0, specifically in the SysSmsLogController's queryAll method. This vulnerability allows any authenticated user, regardless of their privilege level, to send a GET request to the /sys/smslog/queryAll endpoint and retrieve the complete list of SMS log information. The root cause is the absence of proper authorization checks restricting access to administrative users only, leading to unauthorized access to sensitive SMS log data. [1, 2, 3]
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthorized users with any authenticated access to retrieve sensitive SMS log information that should be restricted to administrators. This unauthorized data exposure compromises the confidentiality of SMS logs, potentially leading to information leakage and misuse of sensitive communication data. Since the exploit is publicly available and can be performed remotely, it increases the risk of unauthorized data access. [1, 2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring or attempting to access the endpoint /sys/smslog/queryAll on the fuyang_lipengjun platform version 1.0. Specifically, sending a GET request to http://host/sys/smslog/queryAll as an authenticated user with low privileges and checking if the complete SMS log information is returned indicates the presence of the vulnerability. A simple detection command using curl would be: curl -i -X GET http://host/sys/smslog/queryAll -b 'cookie=your_auth_cookie' to simulate an authenticated request and observe if unauthorized data is accessible. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the /sys/smslog/queryAll endpoint to only authorized administrative users by implementing proper authorization checks in the SysSmsLogController's queryAll method. If patching is not immediately possible, consider blocking or filtering requests to this endpoint at the network or application firewall level to prevent unauthorized access. Additionally, monitor access logs for suspicious requests to this endpoint. The ultimate recommendation is to replace or update the affected component to a version that includes proper authorization controls. [3]