CVE-2025-15085
Unknown Unknown - Not Provided
Improper Authorization in Youlai-Mall Balance Handler Allows Remote Exploit

Publication date: 2025-12-25

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in youlaitech youlai-mall 1.0.0/2.0.0. This affects the function deductBalance of the file mall-ums/ums-boot/src/main/java/com/youlai/mall/ums/controller/app/MemberController.java of the component Balance Handler. The manipulation results in improper authorization. The attack can be launched remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-25
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-25
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
youlai youlai-mall 1.0.0
youlai youlai-mall 2.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-15085 is an improper authorization vulnerability in the youlai-mall software affecting the balance deduction functionality. Specifically, the deductBalance function in MemberController.java allows any authenticated user to deduct balance amounts from any other user's account without verifying ownership or permissions. This means an attacker with a valid login token can specify another user's memberId and reduce their balance arbitrarily. The vulnerability arises because there are no checks to ensure the memberId matches the authenticated user, no role-based access control, and no auditing or rate limiting. This leads to horizontal privilege escalation (BOLA/IDOR), enabling unauthorized financial manipulation remotely. [1, 2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability leads to unauthorized access and manipulation of user financial data, which can violate security best practices required by standards like GDPR and HIPAA. The lack of proper authorization controls and auditing may result in non-compliance with data protection and financial transaction regulations, increasing legal and regulatory risks for the affected organization. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized PUT requests to the endpoint `/mall-ums/app-api/v1/members/{memberId}/balances/_deduct` where the `memberId` does not match the authenticated user. A practical detection method is to look for suspicious or unexpected balance deduction requests using tools like curl or network monitoring. For example, you can test the endpoint with a command similar to: `curl -X PUT -H "Authorization: Bearer <token>" "https://<gateway>/mall-ums/app-api/v1/members/200/balances/_deduct?balance=10000"` and observe if the request succeeds without proper authorization checks. Additionally, monitoring logs for such PUT requests and verifying if authorization checks are enforced can help detect exploitation attempts. Since the vulnerability lacks auditing and logging, implementing custom logging or network traffic analysis focusing on this endpoint is recommended. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable endpoint `/mall-ums/app-api/v1/members/{memberId}/balances/_deduct` to only trusted and authorized users, implementing strict authorization checks to ensure the `memberId` matches the authenticated user, and adding role-based access control to prevent unauthorized balance deductions. Since the vendor has not provided a patch or response, consider disabling or restricting this API endpoint temporarily. Monitoring and logging all requests to this endpoint to detect abuse is also critical. If possible, replace or upgrade the affected component with a secure alternative. Applying network-level controls such as firewall rules or API gateways to limit access can also reduce risk. [1, 2]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized financial loss as attackers can deduct funds from other users' accounts without permission. It enables horizontal privilege escalation, allowing attackers to manipulate balances across multiple accounts if they can enumerate memberIds. The lack of auditing and logging means attacks can go undetected, eroding user trust and damaging the platform's reputation. Additionally, it poses business risks such as financial loss, potential regulatory non-compliance, and increased exposure to automated large-scale attacks. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart