Skip to main content

CVE-2025-10276: Improper Authorization in YunaiV ruoyi-vue-pro

Medium
VulnerabilityCVE-2025-10276cvecve-2025-10276
Published: Fri Sep 12 2025 (09/12/2025, 02:02:06 UTC)
Source: CVE Database V5
Vendor/Project: YunaiV
Product: ruoyi-vue-pro

Description

A security vulnerability has been detected in YunaiV ruoyi-vue-pro up to 2025.09. This vulnerability affects unknown code of the file /crm/contract/transfer. The manipulation of the argument id/newOwnerUserId leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/12/2025, 02:45:17 UTC

Technical Analysis

CVE-2025-10276 is a medium-severity security vulnerability identified in the YunaiV ruoyi-vue-pro product, specifically affecting versions up to 2025.09. The vulnerability resides in the /crm/contract/transfer endpoint, where improper authorization occurs due to insufficient validation of the parameters 'id' and 'newOwnerUserId'. This flaw allows an attacker to manipulate these arguments to perform unauthorized actions, such as transferring contracts or ownership without proper permissions. The vulnerability is remotely exploitable without requiring user interaction or prior authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The CVSS 4.0 score of 5.3 reflects a medium severity level, primarily due to the limited scope of impact on confidentiality, integrity, and availability, and the requirement of low privileges (PR:L) to exploit. The vendor was notified but has not responded or released a patch, and although no known exploits have been observed in the wild, public exploit code has been disclosed, increasing the risk of exploitation. This vulnerability could allow attackers to escalate privileges or manipulate business-critical contract data, potentially leading to unauthorized data access or fraudulent contract transfers within affected systems.

Potential Impact

For European organizations using YunaiV ruoyi-vue-pro, this vulnerability poses a tangible risk to the integrity and confidentiality of contract management processes. Unauthorized contract transfers could lead to financial fraud, data leakage, or disruption of business operations. Given the remote exploitability and lack of vendor response, attackers could leverage this vulnerability to bypass internal controls, potentially impacting compliance with data protection regulations such as GDPR. The medium severity suggests that while the impact is not catastrophic, it could still result in significant operational and reputational damage, especially for organizations heavily reliant on the affected software for customer relationship management and contract handling. The absence of a patch increases exposure time, making timely mitigation critical.

Mitigation Recommendations

Organizations should immediately audit and monitor all contract transfer activities within ruoyi-vue-pro for suspicious or unauthorized changes. Implement strict access controls and role-based permissions to limit who can perform contract transfers, ideally restricting this to trusted administrators. Employ Web Application Firewalls (WAFs) to detect and block anomalous requests targeting the /crm/contract/transfer endpoint, particularly those manipulating 'id' and 'newOwnerUserId' parameters. Since no official patch is available, consider deploying custom input validation or authorization checks at the application or proxy level to enforce proper ownership verification before processing transfer requests. Additionally, conduct thorough code reviews and penetration testing focused on authorization logic in the affected module. Maintain heightened network monitoring to detect exploitation attempts and prepare incident response plans to quickly address any breach resulting from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-11T15:26:37.527Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c3859b563d4c3db0637014

Added to database: 9/12/2025, 2:29:47 AM

Last enriched: 9/12/2025, 2:45:17 AM

Last updated: 9/12/2025, 1:17:17 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats