CVE-2025-10278: Improper Authorization in YunaiV ruoyi-vue-pro
A flaw has been found in YunaiV ruoyi-vue-pro up to 2025.09. Impacted is an unknown function of the file /crm/contact/transfer. This manipulation of the argument ids/newOwnerUserId causes improper authorization. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10278 is a medium-severity vulnerability identified in the YunaiV ruoyi-vue-pro product, specifically affecting versions up to 2025.09. The vulnerability arises from improper authorization controls in an unspecified function within the /crm/contact/transfer endpoint. The flaw is triggered by manipulating the arguments 'ids' and 'newOwnerUserId', which likely correspond to identifiers for contacts and the user to whom ownership is being transferred. Due to insufficient authorization checks, an attacker can remotely exploit this flaw without requiring user interaction or elevated privileges, enabling unauthorized transfer of contact ownership. This could lead to unauthorized access or control over CRM contact data. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium impact with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vendor was notified but did not respond or provide a patch, and while no known exploits are currently observed in the wild, a public exploit has been published, increasing the risk of exploitation. The vulnerability affects the confidentiality, integrity, and availability of CRM contact data by allowing unauthorized modification of ownership, potentially enabling data leakage, data tampering, or disruption of business processes reliant on accurate contact ownership data.
Potential Impact
For European organizations using YunaiV ruoyi-vue-pro, particularly those relying on the CRM module, this vulnerability poses a significant risk to the integrity and confidentiality of customer and contact data. Unauthorized transfer of contact ownership could lead to data leakage, unauthorized data manipulation, or disruption of customer relationship management workflows. This could result in regulatory compliance issues under GDPR due to unauthorized access or modification of personal data. Additionally, attackers could leverage this flaw to escalate privileges within the CRM system or pivot to other internal systems, amplifying the impact. The remote exploitability without authentication increases the threat level, especially for organizations exposing the affected endpoint to the internet or insufficiently segmented internal networks. The lack of vendor response and patch availability further exacerbates the risk, requiring organizations to implement compensating controls promptly.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Restrict network access to the /crm/contact/transfer endpoint by applying strict firewall rules or network segmentation to limit exposure only to trusted internal users or IP ranges. 2) Implement application-layer access controls or web application firewalls (WAFs) with custom rules to detect and block suspicious parameter manipulations targeting 'ids' and 'newOwnerUserId'. 3) Conduct thorough audit logging and monitoring of all contact transfer operations to detect unauthorized or anomalous activities promptly. 4) Employ strict role-based access controls (RBAC) within the CRM system to minimize the number of users authorized to perform contact transfers. 5) If possible, temporarily disable or restrict the contact transfer functionality until a vendor patch or official fix is available. 6) Engage in proactive threat hunting and vulnerability scanning focused on this CVE to identify potential exploitation attempts. 7) Prepare an incident response plan tailored to potential exploitation scenarios involving unauthorized data modification or access within the CRM.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10278: Improper Authorization in YunaiV ruoyi-vue-pro
Description
A flaw has been found in YunaiV ruoyi-vue-pro up to 2025.09. Impacted is an unknown function of the file /crm/contact/transfer. This manipulation of the argument ids/newOwnerUserId causes improper authorization. The attack is possible to be carried out remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10278 is a medium-severity vulnerability identified in the YunaiV ruoyi-vue-pro product, specifically affecting versions up to 2025.09. The vulnerability arises from improper authorization controls in an unspecified function within the /crm/contact/transfer endpoint. The flaw is triggered by manipulating the arguments 'ids' and 'newOwnerUserId', which likely correspond to identifiers for contacts and the user to whom ownership is being transferred. Due to insufficient authorization checks, an attacker can remotely exploit this flaw without requiring user interaction or elevated privileges, enabling unauthorized transfer of contact ownership. This could lead to unauthorized access or control over CRM contact data. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium impact with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vendor was notified but did not respond or provide a patch, and while no known exploits are currently observed in the wild, a public exploit has been published, increasing the risk of exploitation. The vulnerability affects the confidentiality, integrity, and availability of CRM contact data by allowing unauthorized modification of ownership, potentially enabling data leakage, data tampering, or disruption of business processes reliant on accurate contact ownership data.
Potential Impact
For European organizations using YunaiV ruoyi-vue-pro, particularly those relying on the CRM module, this vulnerability poses a significant risk to the integrity and confidentiality of customer and contact data. Unauthorized transfer of contact ownership could lead to data leakage, unauthorized data manipulation, or disruption of customer relationship management workflows. This could result in regulatory compliance issues under GDPR due to unauthorized access or modification of personal data. Additionally, attackers could leverage this flaw to escalate privileges within the CRM system or pivot to other internal systems, amplifying the impact. The remote exploitability without authentication increases the threat level, especially for organizations exposing the affected endpoint to the internet or insufficiently segmented internal networks. The lack of vendor response and patch availability further exacerbates the risk, requiring organizations to implement compensating controls promptly.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Restrict network access to the /crm/contact/transfer endpoint by applying strict firewall rules or network segmentation to limit exposure only to trusted internal users or IP ranges. 2) Implement application-layer access controls or web application firewalls (WAFs) with custom rules to detect and block suspicious parameter manipulations targeting 'ids' and 'newOwnerUserId'. 3) Conduct thorough audit logging and monitoring of all contact transfer operations to detect unauthorized or anomalous activities promptly. 4) Employ strict role-based access controls (RBAC) within the CRM system to minimize the number of users authorized to perform contact transfers. 5) If possible, temporarily disable or restrict the contact transfer functionality until a vendor patch or official fix is available. 6) Engage in proactive threat hunting and vulnerability scanning focused on this CVE to identify potential exploitation attempts. 7) Prepare an incident response plan tailored to potential exploitation scenarios involving unauthorized data modification or access within the CRM.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-11T15:26:43.078Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68c394f4b40dc0e4c24ff7c5
Added to database: 9/12/2025, 3:35:16 AM
Last enriched: 9/12/2025, 3:36:29 AM
Last updated: 9/12/2025, 7:01:38 AM
Views: 5
Related Threats
CVE-2025-57578: n/a
CriticalCVE-2025-10267: CWE-306 Missing Authentication for Critical Function in NewType Infortech NUP Portal
MediumCVE-2025-55835: n/a
CriticalCVE-2025-59054: CWE-552: Files or Directories Accessible to External Parties in Dstack-TEE dstack
HighCVE-2025-10365: CWE-287 Improper Authentication in Evertz 3080ipx-10G
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.