CVE-2025-10987: Improper Authorization in YunaiV yudao-cloud
A vulnerability was determined in YunaiV yudao-cloud up to 2025.09. Affected by this issue is some unknown functionality of the file /crm/contact/transfer of the component HTTP Request Handler. This manipulation of the argument contactId causes improper authorization. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10987 is a medium-severity vulnerability affecting the YunaiV yudao-cloud product, specifically versions up to 2025.09. The vulnerability resides in the HTTP Request Handler component, within the /crm/contact/transfer functionality. It involves improper authorization due to manipulation of the contactId argument. This flaw allows an attacker to remotely initiate unauthorized actions related to contact transfer operations without proper permission checks. The vulnerability does not require user interaction and can be exploited over the network with low attack complexity and no privileges required, though some level of limited privileges (PR:L) is indicated by the CVSS vector. The impact on confidentiality, integrity, and availability is limited but present, as unauthorized access to contact transfer operations could lead to unauthorized data manipulation or exposure within the CRM module. The vendor was notified but has not responded or provided a patch, and while the exploit has been publicly disclosed, there are no known exploits in the wild at this time. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to the combination of network attack vector, low complexity, no user interaction, and limited impact on system security properties.
Potential Impact
For European organizations using YunaiV yudao-cloud, particularly those relying on the CRM/contact management features, this vulnerability poses a risk of unauthorized data manipulation or unauthorized transfer of contact information. This could lead to data integrity issues, potential data leakage, and disruption of customer relationship management processes. Organizations in sectors such as finance, healthcare, and public administration, where contact data is sensitive and regulated under GDPR, may face compliance risks and reputational damage if this vulnerability is exploited. The lack of vendor response and patch availability increases the window of exposure. Attackers could leverage this vulnerability to escalate privileges within the CRM system or pivot to other internal systems if the compromised contact data is used for further social engineering or lateral movement.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement compensating controls immediately. These include: 1) Restricting network access to the yudao-cloud CRM module to trusted IP addresses and internal networks only, using firewalls or network segmentation. 2) Implementing strict monitoring and logging of all /crm/contact/transfer requests to detect anomalous or unauthorized activity. 3) Applying application-layer access controls or web application firewalls (WAFs) to validate and sanitize the contactId parameter and block suspicious requests. 4) Conducting regular audits of user permissions and roles within yudao-cloud to minimize privilege levels and reduce attack surface. 5) Preparing incident response plans specific to this vulnerability, including rapid isolation of affected systems if exploitation is detected. 6) Engaging with the vendor for updates and considering alternative CRM solutions if the vendor remains unresponsive. Once a patch is released, prioritize immediate deployment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10987: Improper Authorization in YunaiV yudao-cloud
Description
A vulnerability was determined in YunaiV yudao-cloud up to 2025.09. Affected by this issue is some unknown functionality of the file /crm/contact/transfer of the component HTTP Request Handler. This manipulation of the argument contactId causes improper authorization. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10987 is a medium-severity vulnerability affecting the YunaiV yudao-cloud product, specifically versions up to 2025.09. The vulnerability resides in the HTTP Request Handler component, within the /crm/contact/transfer functionality. It involves improper authorization due to manipulation of the contactId argument. This flaw allows an attacker to remotely initiate unauthorized actions related to contact transfer operations without proper permission checks. The vulnerability does not require user interaction and can be exploited over the network with low attack complexity and no privileges required, though some level of limited privileges (PR:L) is indicated by the CVSS vector. The impact on confidentiality, integrity, and availability is limited but present, as unauthorized access to contact transfer operations could lead to unauthorized data manipulation or exposure within the CRM module. The vendor was notified but has not responded or provided a patch, and while the exploit has been publicly disclosed, there are no known exploits in the wild at this time. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to the combination of network attack vector, low complexity, no user interaction, and limited impact on system security properties.
Potential Impact
For European organizations using YunaiV yudao-cloud, particularly those relying on the CRM/contact management features, this vulnerability poses a risk of unauthorized data manipulation or unauthorized transfer of contact information. This could lead to data integrity issues, potential data leakage, and disruption of customer relationship management processes. Organizations in sectors such as finance, healthcare, and public administration, where contact data is sensitive and regulated under GDPR, may face compliance risks and reputational damage if this vulnerability is exploited. The lack of vendor response and patch availability increases the window of exposure. Attackers could leverage this vulnerability to escalate privileges within the CRM system or pivot to other internal systems if the compromised contact data is used for further social engineering or lateral movement.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement compensating controls immediately. These include: 1) Restricting network access to the yudao-cloud CRM module to trusted IP addresses and internal networks only, using firewalls or network segmentation. 2) Implementing strict monitoring and logging of all /crm/contact/transfer requests to detect anomalous or unauthorized activity. 3) Applying application-layer access controls or web application firewalls (WAFs) to validate and sanitize the contactId parameter and block suspicious requests. 4) Conducting regular audits of user permissions and roles within yudao-cloud to minimize privilege levels and reduce attack surface. 5) Preparing incident response plans specific to this vulnerability, including rapid isolation of affected systems if exploitation is detected. 6) Engaging with the vendor for updates and considering alternative CRM solutions if the vendor remains unresponsive. Once a patch is released, prioritize immediate deployment.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-25T17:12:14.245Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d5da069e21be37e937d02b
Added to database: 9/26/2025, 12:10:46 AM
Last enriched: 10/3/2025, 12:45:02 AM
Last updated: 1/7/2026, 8:53:03 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.