CVE-2025-10278: Improper Authorization in YunaiV ruoyi-vue-pro
A flaw has been found in YunaiV ruoyi-vue-pro up to 2025.09. Impacted is an unknown function of the file /crm/contact/transfer. This manipulation of the argument ids/newOwnerUserId causes improper authorization. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10278 is a medium severity vulnerability identified in the YunaiV ruoyi-vue-pro software, specifically affecting versions up to 2025.09. The flaw resides in an unspecified function within the /crm/contact/transfer endpoint, where improper authorization occurs due to manipulation of the parameters 'ids' and 'newOwnerUserId'. This vulnerability allows an attacker to remotely exploit the system without requiring user interaction or elevated privileges beyond low-level privileges (PR:L). The improper authorization means that an attacker can potentially transfer ownership of CRM contacts without proper permissions, leading to unauthorized access or modification of sensitive customer relationship data. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor has not responded to early disclosure attempts, and no patches or mitigations have been published yet. Although no known exploits are currently in the wild, a proof-of-concept exploit has been published, increasing the risk of exploitation.
Potential Impact
For European organizations using YunaiV ruoyi-vue-pro, particularly those managing CRM data, this vulnerability poses a risk of unauthorized data manipulation and potential data breaches. Improper authorization in contact transfer functionality could allow attackers to hijack or reassign customer contacts, leading to data integrity issues, unauthorized data access, and potential compliance violations under GDPR due to mishandling of personal data. The impact on confidentiality and integrity, although rated low individually, can be significant when combined with other vulnerabilities or insider threats. Additionally, unauthorized contact transfers could disrupt business operations, sales processes, and customer trust. Since the attack can be performed remotely without user interaction, organizations face a higher risk of automated or targeted attacks. The lack of vendor response and absence of patches further exacerbate the threat landscape for affected European entities.
Mitigation Recommendations
European organizations should immediately audit their use of YunaiV ruoyi-vue-pro, focusing on the /crm/contact/transfer functionality. Until an official patch is released, organizations should implement strict network segmentation and access controls to limit exposure of the vulnerable endpoint to trusted internal networks only. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious parameter manipulation attempts targeting 'ids' and 'newOwnerUserId'. Conduct thorough logging and monitoring of CRM contact transfer activities to detect anomalous behavior indicative of exploitation attempts. Additionally, enforce the principle of least privilege for all users interacting with the CRM system, ensuring that only authorized personnel can perform contact transfers. Organizations should also engage with the vendor for updates and consider temporary disabling or restricting the vulnerable functionality if feasible. Finally, prepare incident response plans specific to potential exploitation scenarios involving unauthorized data transfers.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10278: Improper Authorization in YunaiV ruoyi-vue-pro
Description
A flaw has been found in YunaiV ruoyi-vue-pro up to 2025.09. Impacted is an unknown function of the file /crm/contact/transfer. This manipulation of the argument ids/newOwnerUserId causes improper authorization. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10278 is a medium severity vulnerability identified in the YunaiV ruoyi-vue-pro software, specifically affecting versions up to 2025.09. The flaw resides in an unspecified function within the /crm/contact/transfer endpoint, where improper authorization occurs due to manipulation of the parameters 'ids' and 'newOwnerUserId'. This vulnerability allows an attacker to remotely exploit the system without requiring user interaction or elevated privileges beyond low-level privileges (PR:L). The improper authorization means that an attacker can potentially transfer ownership of CRM contacts without proper permissions, leading to unauthorized access or modification of sensitive customer relationship data. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor has not responded to early disclosure attempts, and no patches or mitigations have been published yet. Although no known exploits are currently in the wild, a proof-of-concept exploit has been published, increasing the risk of exploitation.
Potential Impact
For European organizations using YunaiV ruoyi-vue-pro, particularly those managing CRM data, this vulnerability poses a risk of unauthorized data manipulation and potential data breaches. Improper authorization in contact transfer functionality could allow attackers to hijack or reassign customer contacts, leading to data integrity issues, unauthorized data access, and potential compliance violations under GDPR due to mishandling of personal data. The impact on confidentiality and integrity, although rated low individually, can be significant when combined with other vulnerabilities or insider threats. Additionally, unauthorized contact transfers could disrupt business operations, sales processes, and customer trust. Since the attack can be performed remotely without user interaction, organizations face a higher risk of automated or targeted attacks. The lack of vendor response and absence of patches further exacerbate the threat landscape for affected European entities.
Mitigation Recommendations
European organizations should immediately audit their use of YunaiV ruoyi-vue-pro, focusing on the /crm/contact/transfer functionality. Until an official patch is released, organizations should implement strict network segmentation and access controls to limit exposure of the vulnerable endpoint to trusted internal networks only. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious parameter manipulation attempts targeting 'ids' and 'newOwnerUserId'. Conduct thorough logging and monitoring of CRM contact transfer activities to detect anomalous behavior indicative of exploitation attempts. Additionally, enforce the principle of least privilege for all users interacting with the CRM system, ensuring that only authorized personnel can perform contact transfers. Organizations should also engage with the vendor for updates and consider temporary disabling or restricting the vulnerable functionality if feasible. Finally, prepare incident response plans specific to potential exploitation scenarios involving unauthorized data transfers.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-11T15:26:43.078Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c394f4b40dc0e4c24ff7c5
Added to database: 9/12/2025, 3:35:16 AM
Last enriched: 9/19/2025, 3:58:08 PM
Last updated: 10/30/2025, 12:42:51 PM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63608: n/a
UnknownMajor US Telecom Backbone Firm Hacked by Nation-State Actors
MediumCVE-2025-10317: CWE-352 Cross-Site Request Forgery (CSRF) in OpenSolution Quick.Cart
MediumCanada Says Hackers Tampered With ICS at Water Facility, Oil and Gas Firm
MediumCVE-2025-39663: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Checkmk GmbH Checkmk
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.