CVE-2025-15087
Unknown Unknown - Not Provided
Improper Authorization in Youlai-Mall submitOrderPayment Function

Publication date: 2025-12-25

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security vulnerability has been detected in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function submitOrderPayment of the file mall-oms/oms-boot/src/main/java/com/youlai/mall/oms/controller/app/OrderController.java. Such manipulation of the argument orderSn leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-25
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-25
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
youlai youlaitech 2.0.0
youlai youlaitech 1.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-15087 is an improper authorization vulnerability in the youlai-mall application, specifically in the submitOrderPayment function of the OrderController.java file. The vulnerability arises because the system does not verify that the orderSn (order serial number) provided by a user actually belongs to them. This missing ownership validation and lack of role or permission checks allow any authenticated user to initiate payments on orders that belong to other users. Essentially, an attacker can supply another user's orderSn and cause the system to process payments on their behalf without authorization, leading to horizontal privilege escalation and unauthorized payment initiation. [1, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not contain any information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability impact me? :

This vulnerability can have several impacts: it enables attackers to initiate payments on orders they do not own, causing unauthorized financial transactions. This can lead to payment confusion, fraudulent claims of goods, duplicate payments, and business logic bypass. Financial reconciliation becomes problematic due to mismatched payment and order ownership records. Additionally, abuse of third-party payment providers may result in fraud detection triggers or account suspension. The lack of auditing and logging complicates fraud investigation and dispute resolution. Overall, it can erode user trust and damage the platform's reputation. [1, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring and testing the POST endpoint `/mall-oms/app-api/v1/orders/payment` for improper authorization. A practical detection method is to attempt sending a POST request with an `orderSn` value that does not belong to the authenticated user and observe if the system allows payment initiation. An example curl command to test this is: ```curl -X POST -H "Authorization: Bearer <token>" -H "Content-Type: application/json" -d '{"orderSn":"<victim_orderSn>"}' "https://<gateway>/mall-oms/app-api/v1/orders/payment"```. If the request succeeds and returns payment details, the vulnerability is present. Additionally, monitoring logs for payment requests where the `orderSn` does not match the authenticated user's ID can help detect exploitation attempts. However, note that the system lacks auditing and logging, which complicates detection. [1, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the vulnerable endpoint by implementing proper authorization checks to verify that the `orderSn` belongs to the authenticated user before processing payment. This involves adding ownership validation logic comparing the order's `memberId` with the current user's ID and enforcing role or permission controls (e.g., using `@PreAuthorize` annotations). Since no official mitigations or patches are available and the vendor has not responded, consider temporarily disabling the payment initiation endpoint or replacing the affected product. Monitoring and rate-limiting requests to prevent abuse and fraud can also help reduce impact until a permanent fix is applied. [2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart