CVE-2025-14052
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-05

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected by this vulnerability is the function getMemberById of the file /mall-ums/app-api/v1/members/. The manipulation of the argument memberId leads to improper access controls. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-05
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
youlai youlai-mall 1.0.0
youlai youlai-mall 2.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the function getMemberById of the youlai-mall application versions 1.0.0 and 2.0.0. It involves improper access controls caused by manipulation of the memberId argument, allowing an attacker to potentially access data or functionality they should not be able to. The attack can be performed remotely, and the exploit has been publicly disclosed.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized access to member information or functionality within the youlai-mall application. This could result in data exposure, data modification, or other unauthorized actions, potentially compromising user privacy and system integrity.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability leads to unauthorized disclosure of personal identifiers such as users' WeChat openid, which constitutes a privacy violation and increases the risk of regulatory noncompliance. This improper access control and exposure of sensitive personal data can result in breaches of data protection standards like GDPR and HIPAA, which mandate strict controls over personal data access and confidentiality. [3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to access the vulnerable API endpoint with manipulated memberId parameters using a valid authorization token. For example, you can use a curl command to send a GET request to the endpoint with different memberId values and observe if the server returns data for users other than the authenticated user. A sample command is: curl -H "Authorization: Bearer <token>" https://<host>/mall-ums/app-api/v1/members/12345/openid If the response returns another user's WeChat openid, the system is vulnerable. [3]


What immediate steps should I take to mitigate this vulnerability?

There are no known countermeasures or patches currently available for this vulnerability. Immediate steps include considering replacing the affected product or disabling the vulnerable API endpoint if possible. Additionally, restrict access to the API to trusted users only and monitor for suspicious activity. Applying strict access control checks to ensure that the memberId parameter matches the authenticated user's ID is recommended once a fix is available. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart