Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10278: Improper Authorization in YunaiV ruoyi-vue-pro

0
Medium
VulnerabilityCVE-2025-10278cvecve-2025-10278
Published: Fri Sep 12 2025 (09/12/2025, 03:32:07 UTC)
Source: CVE Database V5
Vendor/Project: YunaiV
Product: ruoyi-vue-pro

Description

A flaw has been found in YunaiV ruoyi-vue-pro up to 2025.09. Impacted is an unknown function of the file /crm/contact/transfer. This manipulation of the argument ids/newOwnerUserId causes improper authorization. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/19/2025, 15:58:08 UTC

Technical Analysis

CVE-2025-10278 is a medium severity vulnerability identified in the YunaiV ruoyi-vue-pro software, specifically affecting versions up to 2025.09. The flaw resides in an unspecified function within the /crm/contact/transfer endpoint, where improper authorization occurs due to manipulation of the parameters 'ids' and 'newOwnerUserId'. This vulnerability allows an attacker to remotely exploit the system without requiring user interaction or elevated privileges beyond low-level privileges (PR:L). The improper authorization means that an attacker can potentially transfer ownership of CRM contacts without proper permissions, leading to unauthorized access or modification of sensitive customer relationship data. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vendor has not responded to early disclosure attempts, and no patches or mitigations have been published yet. Although no known exploits are currently in the wild, a proof-of-concept exploit has been published, increasing the risk of exploitation.

Potential Impact

For European organizations using YunaiV ruoyi-vue-pro, particularly those managing CRM data, this vulnerability poses a risk of unauthorized data manipulation and potential data breaches. Improper authorization in contact transfer functionality could allow attackers to hijack or reassign customer contacts, leading to data integrity issues, unauthorized data access, and potential compliance violations under GDPR due to mishandling of personal data. The impact on confidentiality and integrity, although rated low individually, can be significant when combined with other vulnerabilities or insider threats. Additionally, unauthorized contact transfers could disrupt business operations, sales processes, and customer trust. Since the attack can be performed remotely without user interaction, organizations face a higher risk of automated or targeted attacks. The lack of vendor response and absence of patches further exacerbate the threat landscape for affected European entities.

Mitigation Recommendations

European organizations should immediately audit their use of YunaiV ruoyi-vue-pro, focusing on the /crm/contact/transfer functionality. Until an official patch is released, organizations should implement strict network segmentation and access controls to limit exposure of the vulnerable endpoint to trusted internal networks only. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious parameter manipulation attempts targeting 'ids' and 'newOwnerUserId'. Conduct thorough logging and monitoring of CRM contact transfer activities to detect anomalous behavior indicative of exploitation attempts. Additionally, enforce the principle of least privilege for all users interacting with the CRM system, ensuring that only authorized personnel can perform contact transfers. Organizations should also engage with the vendor for updates and consider temporary disabling or restricting the vulnerable functionality if feasible. Finally, prepare incident response plans specific to potential exploitation scenarios involving unauthorized data transfers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-11T15:26:43.078Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c394f4b40dc0e4c24ff7c5

Added to database: 9/12/2025, 3:35:16 AM

Last enriched: 9/19/2025, 3:58:08 PM

Last updated: 10/30/2025, 12:42:51 PM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats