CVE-2025-15086
Unknown Unknown - Not Provided
Improper Access Control in Youlai-Mall getMemberByMobile Function

Publication date: 2025-12-25

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in youlaitech youlai-mall 1.0.0/2.0.0. This impacts the function getMemberByMobile of the file mall-ums/ums-boot/src/main/java/com/youlai/mall/ums/controller/app/MemberController.java. This manipulation causes improper access controls. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-25
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-25
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
youlai youlai-mall 1.0.0
youlai youlai-mall 2.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-15086 is an improper access control vulnerability in the youlai-mall software affecting the API endpoint that retrieves member information by mobile number. The vulnerable function does not verify that the requested mobile number belongs to the authenticated user and lacks role or permission checks. This allows any authenticated user to query arbitrary mobile numbers and obtain sensitive authentication-related data such as member IDs, mobile numbers, status, and usernames. The flaw enables attackers to perform horizontal privilege escalation, exposing private information and facilitating further attacks on victim accounts. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive authentication data and internal member IDs, enabling attackers to map mobile numbers to user accounts. Attackers with valid credentials can exploit this to perform horizontal privilege escalation, accessing or manipulating other users' data on related endpoints (e.g., balances, orders, addresses). It also allows attackers to enumerate valid mobile numbers, aiding phishing, social engineering, and harassment campaigns. The increased attack surface can be chained with other vulnerabilities to compromise victim accounts, undermining system trust and security. [1, 2, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability violates privacy regulations such as GDPR, CCPA, and PIPL by exposing personally identifiable information (PII), specifically mobile numbers linked to internal member IDs, without proper authorization. This unauthorized disclosure of sensitive data breaches data protection requirements, potentially leading to non-compliance with these standards and regulations. It increases the risk of targeted harassment, social engineering, and privacy violations. [2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring and testing the API endpoint GET /mall-ums/app-api/v1/members/mobile/{mobile} for improper access control. You can attempt to send authenticated GET requests with different mobile numbers to see if the system returns member information without proper authorization. For example, using curl with a valid app login token: curl -H "Authorization: Bearer <valid_token>" https://<target>/mall-ums/app-api/v1/members/mobile/<victim_mobile>. If the response returns member data for mobile numbers other than the authenticated user, the vulnerability is present. Additionally, check logs for unusual enumeration patterns or repeated access to this endpoint with varying mobile numbers. No built-in rate limiting or auditing exists, so detection relies on active testing and monitoring for suspicious API usage. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable API endpoint by implementing proper access control checks to ensure that users can only query their own mobile number. This involves adding ownership validation (e.g., verifying the requested mobile number matches the authenticated user's mobile) and enforcing role or permission checks (e.g., using @PreAuthorize annotations). If patching is not possible, consider disabling or restricting access to the endpoint entirely. Additionally, implement rate limiting and auditing to detect and prevent enumeration attacks. Since no official vendor patch is available, consider replacing the affected component with an alternative product or applying custom access control fixes as soon as possible. [1, 2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart