CVE-2025-15087
Improper Authorization in Youlai-Mall submitOrderPayment Function
Publication date: 2025-12-25
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| youlai | youlaitech | 2.0.0 |
| youlai | youlaitech | 1.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-15087 is an improper authorization vulnerability in the youlai-mall application, specifically in the submitOrderPayment function of the OrderController.java file. The vulnerability arises because the system does not verify that the orderSn (order serial number) provided by a user actually belongs to them. This missing ownership validation and lack of role or permission checks allow any authenticated user to initiate payments on orders that belong to other users. Essentially, an attacker can supply another user's orderSn and cause the system to process payments on their behalf without authorization, leading to horizontal privilege escalation and unauthorized payment initiation. [1, 3]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources do not contain any information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
How can this vulnerability impact me? :
This vulnerability can have several impacts: it enables attackers to initiate payments on orders they do not own, causing unauthorized financial transactions. This can lead to payment confusion, fraudulent claims of goods, duplicate payments, and business logic bypass. Financial reconciliation becomes problematic due to mismatched payment and order ownership records. Additionally, abuse of third-party payment providers may result in fraud detection triggers or account suspension. The lack of auditing and logging complicates fraud investigation and dispute resolution. Overall, it can erode user trust and damage the platform's reputation. [1, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring and testing the POST endpoint `/mall-oms/app-api/v1/orders/payment` for improper authorization. A practical detection method is to attempt sending a POST request with an `orderSn` value that does not belong to the authenticated user and observe if the system allows payment initiation. An example curl command to test this is: ```curl -X POST -H "Authorization: Bearer <token>" -H "Content-Type: application/json" -d '{"orderSn":"<victim_orderSn>"}' "https://<gateway>/mall-oms/app-api/v1/orders/payment"```. If the request succeeds and returns payment details, the vulnerability is present. Additionally, monitoring logs for payment requests where the `orderSn` does not match the authenticated user's ID can help detect exploitation attempts. However, note that the system lacks auditing and logging, which complicates detection. [1, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the vulnerable endpoint by implementing proper authorization checks to verify that the `orderSn` belongs to the authenticated user before processing payment. This involves adding ownership validation logic comparing the order's `memberId` with the current user's ID and enforcing role or permission controls (e.g., using `@PreAuthorize` annotations). Since no official mitigations or patches are available and the vendor has not responded, consider temporarily disabling the payment initiation endpoint or replacing the affected product. Monitoring and rate-limiting requests to prevent abuse and fraud can also help reduce impact until a permanent fix is applied. [2, 3]