CVE-2026-31151
Received Received - Intake
Authentication Bypass in Kaleris YMS v7.2.2.1 Allows Unauthorized Access

Publication date: 2026-04-06

Last updated on: 2026-04-10

Assigner: MITRE

Description
An issue in the login mechanism of Kaleris YMS v7.2.2.1 allows attackers to bypass login verification to access the application 's resources.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-06
Last Modified
2026-04-10
Generated
2026-05-07
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
kaleris yard_management_solutions 7.2.2.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-288 The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-31151 affects Kaleris YMS version 7.2.2.1, a web application for yard management. The vulnerability is in the login mechanism for the Driver User Role, which has two separate login URLs: one at /general/home and another at /truck (YMS Truck Display URL). Each URL requires separate credentials, but due to improper verification, a driver authenticated on one URL can bypass the login panel on the other URL and access its functionalities without re-entering credentials.

The exploitation involves logging in as a Driver User on the /truck URL, then opening the /general/home URL in a new browser tab within the same session. The driver can then access the dashboard of the second URL without submitting login credentials again, effectively bypassing login verification.


How can this vulnerability impact me? :

This vulnerability allows an attacker with valid credentials on one part of the application to bypass login verification on another part, gaining unauthorized access to resources and functionalities they should not have access to.

Such unauthorized access can lead to exposure of sensitive information, manipulation of application data, or misuse of application features, potentially compromising the security and integrity of the yard management system.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by verifying if a valid session cookie from one login URL allows access to the other login URL without re-authentication.

To test this, first log in as a Driver User at the `/truck` URL, then attempt to access `/general/home` in the same browser session without logging in again.

A practical detection method involves capturing HTTP requests and responses using tools like curl or a web proxy to check if the session cookie from `/truck` grants access to `/general/home`.

  • Use curl to log in to `/truck` and save the session cookie: curl -c cookies.txt -X POST https://<target>/truck/login -d 'username=driver&password=yourpassword'
  • Use curl with the saved cookie to access `/general/home`: curl -b cookies.txt https://<target>/general/home

If the response from `/general/home` indicates access without requiring login, the vulnerability is present.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the affected URLs and enforcing separate session management for each login URL.

Administrators should ensure that session cookies from one login URL are not valid for the other URL, effectively isolating authentication contexts.

If possible, apply any available patches or updates from the vendor addressing this authentication bypass.

As a temporary measure, consider implementing additional access controls or network segmentation to limit exposure of the affected application.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Kaleris YMS v7.2.2.1 allows attackers to bypass login verification and gain unauthorized access to application resources. This unauthorized access could lead to exposure or misuse of sensitive data managed by the application.

Such unauthorized access may impact compliance with common standards and regulations like GDPR and HIPAA, which require strict access controls and protection of personal and sensitive information. Failure to properly authenticate users and prevent unauthorized access could result in violations of these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart