CVE-2025-10819: Improper Authorization in fuyang_lipengjun platform
A security vulnerability has been detected in fuyang_lipengjun platform 1.0. This issue affects the function UserCouponController of the file /usercoupon/queryAll. The manipulation leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
AI Analysis
Technical Summary
CVE-2025-10819 is a medium-severity security vulnerability identified in version 1.0 of the fuyang_lipengjun platform. The vulnerability resides in the UserCouponController component, specifically within the /usercoupon/queryAll endpoint. The core issue is improper authorization, which allows an attacker to remotely exploit the platform without requiring user interaction or elevated privileges. According to the CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P), the attack can be performed over the network with low attack complexity and no user interaction, requiring only low privileges. The vulnerability impacts the confidentiality of the system to a limited extent, as indicated by the low confidentiality impact metric, while integrity and availability remain unaffected. The exploit has been publicly disclosed, increasing the risk of potential exploitation, although no known exploits in the wild have been reported yet. The absence of patches or mitigation links suggests that the vendor has not yet released an official fix, which could leave systems exposed if not addressed promptly. Improper authorization in this context likely means that users can access or query coupon data beyond their permitted scope, potentially exposing sensitive user or business information or allowing unauthorized coupon usage or enumeration. This could lead to financial losses or reputational damage if exploited at scale.
Potential Impact
For European organizations using the fuyang_lipengjun platform version 1.0, this vulnerability could lead to unauthorized access to user coupon data, potentially exposing sensitive customer information or enabling fraudulent coupon redemptions. This could result in direct financial losses, erosion of customer trust, and regulatory compliance issues, especially under GDPR, which mandates strict controls over personal data access and protection. The improper authorization flaw could also be leveraged as a foothold for further attacks if combined with other vulnerabilities. Although the impact on system integrity and availability is low, the confidentiality breach alone can have significant consequences for businesses relying on this platform for customer engagement or promotions. Organizations in sectors such as retail, e-commerce, or marketing that utilize coupon systems are particularly at risk. The public disclosure of the exploit increases the urgency for European entities to assess their exposure and implement mitigations to prevent unauthorized data access or abuse.
Mitigation Recommendations
European organizations should immediately audit their deployment of the fuyang_lipengjun platform to determine if version 1.0 is in use. In the absence of an official patch, organizations should implement strict access controls around the /usercoupon/queryAll endpoint, such as network-level restrictions (firewalls, IP whitelisting) and application-layer controls (web application firewalls with custom rules to detect anomalous requests). Monitoring and logging access to this endpoint should be enhanced to detect unusual query patterns indicative of exploitation attempts. If possible, disable or restrict the UserCouponController functionality until a vendor patch is available. Additionally, organizations should conduct internal code reviews or penetration tests focusing on authorization logic to identify and remediate similar weaknesses. User privileges should be reviewed and minimized to the least necessary level to reduce the risk of privilege abuse. Finally, organizations should stay alert for vendor updates or community patches and apply them promptly once released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10819: Improper Authorization in fuyang_lipengjun platform
Description
A security vulnerability has been detected in fuyang_lipengjun platform 1.0. This issue affects the function UserCouponController of the file /usercoupon/queryAll. The manipulation leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10819 is a medium-severity security vulnerability identified in version 1.0 of the fuyang_lipengjun platform. The vulnerability resides in the UserCouponController component, specifically within the /usercoupon/queryAll endpoint. The core issue is improper authorization, which allows an attacker to remotely exploit the platform without requiring user interaction or elevated privileges. According to the CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P), the attack can be performed over the network with low attack complexity and no user interaction, requiring only low privileges. The vulnerability impacts the confidentiality of the system to a limited extent, as indicated by the low confidentiality impact metric, while integrity and availability remain unaffected. The exploit has been publicly disclosed, increasing the risk of potential exploitation, although no known exploits in the wild have been reported yet. The absence of patches or mitigation links suggests that the vendor has not yet released an official fix, which could leave systems exposed if not addressed promptly. Improper authorization in this context likely means that users can access or query coupon data beyond their permitted scope, potentially exposing sensitive user or business information or allowing unauthorized coupon usage or enumeration. This could lead to financial losses or reputational damage if exploited at scale.
Potential Impact
For European organizations using the fuyang_lipengjun platform version 1.0, this vulnerability could lead to unauthorized access to user coupon data, potentially exposing sensitive customer information or enabling fraudulent coupon redemptions. This could result in direct financial losses, erosion of customer trust, and regulatory compliance issues, especially under GDPR, which mandates strict controls over personal data access and protection. The improper authorization flaw could also be leveraged as a foothold for further attacks if combined with other vulnerabilities. Although the impact on system integrity and availability is low, the confidentiality breach alone can have significant consequences for businesses relying on this platform for customer engagement or promotions. Organizations in sectors such as retail, e-commerce, or marketing that utilize coupon systems are particularly at risk. The public disclosure of the exploit increases the urgency for European entities to assess their exposure and implement mitigations to prevent unauthorized data access or abuse.
Mitigation Recommendations
European organizations should immediately audit their deployment of the fuyang_lipengjun platform to determine if version 1.0 is in use. In the absence of an official patch, organizations should implement strict access controls around the /usercoupon/queryAll endpoint, such as network-level restrictions (firewalls, IP whitelisting) and application-layer controls (web application firewalls with custom rules to detect anomalous requests). Monitoring and logging access to this endpoint should be enhanced to detect unusual query patterns indicative of exploitation attempts. If possible, disable or restrict the UserCouponController functionality until a vendor patch is available. Additionally, organizations should conduct internal code reviews or penetration tests focusing on authorization logic to identify and remediate similar weaknesses. User privileges should be reviewed and minimized to the least necessary level to reduce the risk of privilege abuse. Finally, organizations should stay alert for vendor updates or community patches and apply them promptly once released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T15:59:03.298Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d1cf046f645f121d636561
Added to database: 9/22/2025, 10:34:44 PM
Last enriched: 9/22/2025, 10:35:27 PM
Last updated: 9/23/2025, 12:10:56 AM
Views: 5
Related Threats
CVE-2025-46711: CWE-476: NULL Pointer Dereference in Imagination Technologies Graphics DDK
MediumCVE-2025-10785: SQL Injection in Campcodes Grocery Sales and Inventory System
MediumCVE-2025-57682: n/a
MediumCVE-2025-57430: n/a
HighCVE-2025-35042: CWE-1392 Use of Default Credentials in Airship AI Acropolis
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.