CVE-2025-10822
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-23

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability has been found in fuyang_lipengjun platform 1.0. The impacted element is the function SysSmsLogController of the file /sys/smslog/queryAll. Such manipulation leads to improper authorization. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-23
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-09-23
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
fuyang_lipengjun platform 1.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-10822 is a broken function level authorization vulnerability in the fuyang_lipengjun platform version 1.0, specifically in the SysSmsLogController's queryAll method. This vulnerability allows any authenticated user, regardless of their privilege level, to send a GET request to the /sys/smslog/queryAll endpoint and retrieve the complete list of SMS log information. The root cause is the absence of proper authorization checks restricting access to administrative users only, leading to unauthorized access to sensitive SMS log data. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized users with any authenticated access to retrieve sensitive SMS log information that should be restricted to administrators. This unauthorized data exposure compromises the confidentiality of SMS logs, potentially leading to information leakage and misuse of sensitive communication data. Since the exploit is publicly available and can be performed remotely, it increases the risk of unauthorized data access. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring or attempting to access the endpoint /sys/smslog/queryAll on the fuyang_lipengjun platform version 1.0. Specifically, sending a GET request to http://host/sys/smslog/queryAll as an authenticated user with low privileges and checking if the complete SMS log information is returned indicates the presence of the vulnerability. A simple detection command using curl would be: curl -i -X GET http://host/sys/smslog/queryAll -b 'cookie=your_auth_cookie' to simulate an authenticated request and observe if unauthorized data is accessible. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the /sys/smslog/queryAll endpoint to only authorized administrative users by implementing proper authorization checks in the SysSmsLogController's queryAll method. If patching is not immediately possible, consider blocking or filtering requests to this endpoint at the network or application firewall level to prevent unauthorized access. Additionally, monitor access logs for suspicious requests to this endpoint. The ultimate recommendation is to replace or update the affected component to a version that includes proper authorization controls. [3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart