CVE-2025-14051
BaseFortify
Publication date: 2025-12-04
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| youlai | youlai-mall | 1.0.0 |
| youlai | youlai-mall | 2.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-914 | The product does not properly restrict reading from or writing to dynamically-identified variables. |
| CWE-913 | The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a flaw in the youlaitech youlai-mall versions 1.0.0 and 2.0.0, specifically in the functions getById, updateAddress, and deleteAddress within the /mall-ums/app-api/v1/addresses/ file. It allows an attacker to remotely manipulate dynamically-identified variables improperly, potentially leading to unauthorized actions or data manipulation.
How can this vulnerability impact me? :
The vulnerability can be exploited remotely to manipulate address-related functions, which may result in unauthorized access or modification of address data. This could lead to data integrity issues, unauthorized changes to user information, or other security impacts depending on how these functions are used within the application.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthorized access and modification of other users' address information, exposing personally identifiable information (PII) such as names, phone numbers, and detailed addresses. This exposure can lead to privacy breaches, social engineering attacks, fraud, and doxing. Such unauthorized disclosure and manipulation of PII can result in noncompliance with data protection regulations like GDPR, CCPA, and PDPA, which mandate strict controls over personal data access and integrity. Therefore, this vulnerability poses a significant risk to compliance with common privacy and data protection standards. [3, 6]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing the API endpoints related to address management (/mall-ums/app-api/v1/addresses/{addressId}) for improper access control. Specifically, you can attempt to access or modify address data of other users by changing the addressId parameter in GET, PUT, or DELETE requests while authenticated as a different user. For example, using curl commands to send requests with a valid user's authorization token but with different addressId values can reveal if unauthorized access or modification is possible. Example commands include: 1. Detect unauthorized read (GET): curl -H "Authorization: Bearer <UserA_Token>" https://<target>/mall-ums/app-api/v1/addresses/<AddressId_of_UserB> 2. Detect unauthorized update (PUT): curl -X PUT -H "Authorization: Bearer <UserA_Token>" -H "Content-Type: application/json" -d '{"id": "<AddressId_of_UserB>", "consigneeName": "Test"}' https://<target>/mall-ums/app-api/v1/addresses/<AddressId_of_UserB> 3. Detect unauthorized delete (DELETE): curl -X DELETE -H "Authorization: Bearer <UserA_Token>" https://<target>/mall-ums/app-api/v1/addresses/<AddressId_of_UserB> If these requests succeed and return data or confirmation of modification/deletion for addresses not belonging to the authenticated user, the vulnerability is present. [3, 6]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the affected API endpoints by implementing proper authorization checks to ensure that users can only access or modify their own address data. Since no official vendor response or patch is available, consider the following actions: 1. Apply strict access control validation on the server side to verify ownership of the addressId before processing getById, updateAddress, or deleteAddress requests. 2. Monitor and log API requests to detect suspicious activity involving addressId manipulation. 3. If possible, temporarily disable or restrict access to the vulnerable endpoints until a patch or fix is available. 4. Consider replacing or upgrading the affected product if no vendor support is forthcoming. These steps help prevent unauthorized access and modification of user address data and reduce the risk of exploitation. [4]