CVE-2025-10674: Improper Authorization in fuyang_lipengjun platform
A vulnerability was identified in fuyang_lipengjun platform 1.0. This affects the function AttributeCategoryController of the file /attributecategory/queryAll. Such manipulation leads to improper authorization. The attack may be launched remotely. The exploit is publicly available and might be used.
AI Analysis
Technical Summary
CVE-2025-10674 is a medium-severity vulnerability affecting version 1.0 of the fuyang_lipengjun platform, specifically within the AttributeCategoryController function of the /attributecategory/queryAll endpoint. The vulnerability arises from improper authorization controls, allowing an attacker to remotely manipulate requests to this endpoint without proper privilege checks. This lack of authorization validation means that an attacker with low privileges (PR:L) can access or query attribute category data that should be restricted. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The CVSS 4.0 vector indicates no need for authentication (AT:N), and the impact on confidentiality, integrity, and availability is low (VC:L, VI:N, VA:N), suggesting limited data exposure or control. Although no known exploits are currently observed in the wild, public exploit code is available, increasing the risk of exploitation. The vulnerability does not affect system confidentiality, integrity, or availability significantly but can lead to unauthorized data disclosure or information leakage within the platform's attribute categories. The absence of patches or mitigation links indicates that organizations using this platform version must proactively address the issue.
Potential Impact
For European organizations using the fuyang_lipengjun platform version 1.0, this vulnerability could lead to unauthorized access to sensitive attribute category data. While the direct impact on confidentiality, integrity, and availability is low, unauthorized data exposure can still have compliance implications under GDPR, especially if personal or sensitive data is involved. Attackers exploiting this vulnerability could gain insights into system configurations or data categorizations, potentially aiding further attacks or reconnaissance. The remote exploitation capability without user interaction increases the risk of automated scanning and exploitation attempts. Organizations in sectors with strict data protection requirements, such as finance, healthcare, or critical infrastructure, may face reputational damage or regulatory scrutiny if this vulnerability is exploited. Additionally, the availability of public exploit code lowers the barrier for attackers, necessitating timely mitigation to prevent potential breaches.
Mitigation Recommendations
Since no official patches or updates are currently available, European organizations should implement compensating controls immediately. These include: 1) Restricting network access to the /attributecategory/queryAll endpoint using firewalls or web application firewalls (WAFs) to allow only trusted IP addresses or internal networks. 2) Implementing strict access control policies at the application or proxy level to enforce proper authorization checks before requests reach the vulnerable endpoint. 3) Monitoring and logging all access to the /attributecategory/queryAll endpoint for unusual or unauthorized activity to enable rapid detection and response. 4) Conducting a thorough review of user privileges and minimizing permissions to the least necessary level, reducing the risk of exploitation by low-privilege users. 5) Engaging with the vendor or platform maintainers to obtain patches or updates as soon as they become available. 6) Considering temporary disabling or limiting the use of the affected functionality if feasible until a fix is applied. These targeted measures go beyond generic advice by focusing on network-level restrictions, access control enforcement, and active monitoring specific to the vulnerable component.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10674: Improper Authorization in fuyang_lipengjun platform
Description
A vulnerability was identified in fuyang_lipengjun platform 1.0. This affects the function AttributeCategoryController of the file /attributecategory/queryAll. Such manipulation leads to improper authorization. The attack may be launched remotely. The exploit is publicly available and might be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10674 is a medium-severity vulnerability affecting version 1.0 of the fuyang_lipengjun platform, specifically within the AttributeCategoryController function of the /attributecategory/queryAll endpoint. The vulnerability arises from improper authorization controls, allowing an attacker to remotely manipulate requests to this endpoint without proper privilege checks. This lack of authorization validation means that an attacker with low privileges (PR:L) can access or query attribute category data that should be restricted. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The CVSS 4.0 vector indicates no need for authentication (AT:N), and the impact on confidentiality, integrity, and availability is low (VC:L, VI:N, VA:N), suggesting limited data exposure or control. Although no known exploits are currently observed in the wild, public exploit code is available, increasing the risk of exploitation. The vulnerability does not affect system confidentiality, integrity, or availability significantly but can lead to unauthorized data disclosure or information leakage within the platform's attribute categories. The absence of patches or mitigation links indicates that organizations using this platform version must proactively address the issue.
Potential Impact
For European organizations using the fuyang_lipengjun platform version 1.0, this vulnerability could lead to unauthorized access to sensitive attribute category data. While the direct impact on confidentiality, integrity, and availability is low, unauthorized data exposure can still have compliance implications under GDPR, especially if personal or sensitive data is involved. Attackers exploiting this vulnerability could gain insights into system configurations or data categorizations, potentially aiding further attacks or reconnaissance. The remote exploitation capability without user interaction increases the risk of automated scanning and exploitation attempts. Organizations in sectors with strict data protection requirements, such as finance, healthcare, or critical infrastructure, may face reputational damage or regulatory scrutiny if this vulnerability is exploited. Additionally, the availability of public exploit code lowers the barrier for attackers, necessitating timely mitigation to prevent potential breaches.
Mitigation Recommendations
Since no official patches or updates are currently available, European organizations should implement compensating controls immediately. These include: 1) Restricting network access to the /attributecategory/queryAll endpoint using firewalls or web application firewalls (WAFs) to allow only trusted IP addresses or internal networks. 2) Implementing strict access control policies at the application or proxy level to enforce proper authorization checks before requests reach the vulnerable endpoint. 3) Monitoring and logging all access to the /attributecategory/queryAll endpoint for unusual or unauthorized activity to enable rapid detection and response. 4) Conducting a thorough review of user privileges and minimizing permissions to the least necessary level, reducing the risk of exploitation by low-privilege users. 5) Engaging with the vendor or platform maintainers to obtain patches or updates as soon as they become available. 6) Considering temporary disabling or limiting the use of the affected functionality if feasible until a fix is applied. These targeted measures go beyond generic advice by focusing on network-level restrictions, access control enforcement, and active monitoring specific to the vulnerable component.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-18T05:52:06.924Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cc27fc88e1289d50d4155e
Added to database: 9/18/2025, 3:40:44 PM
Last enriched: 9/18/2025, 3:41:00 PM
Last updated: 9/18/2025, 3:41:20 PM
Views: 2
Related Threats
CVE-2025-10676: Improper Authorization in fuyang_lipengjun platform
MediumCVE-2025-10675: Improper Authorization in fuyang_lipengjun platform
MediumCVE-2025-55912: n/a
CriticalCVE-2025-50255: n/a
HighCVE-2025-36146: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM watsonx.data
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.