Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10987: Improper Authorization in YunaiV yudao-cloud

0
Medium
VulnerabilityCVE-2025-10987cvecve-2025-10987
Published: Fri Sep 26 2025 (09/26/2025, 00:02:10 UTC)
Source: CVE Database V5
Vendor/Project: YunaiV
Product: yudao-cloud

Description

A vulnerability was determined in YunaiV yudao-cloud up to 2025.09. Affected by this issue is some unknown functionality of the file /crm/contact/transfer of the component HTTP Request Handler. This manipulation of the argument contactId causes improper authorization. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/03/2025, 00:45:02 UTC

Technical Analysis

CVE-2025-10987 is a medium-severity vulnerability affecting the YunaiV yudao-cloud product, specifically versions up to 2025.09. The vulnerability resides in the HTTP Request Handler component, within the /crm/contact/transfer functionality. It involves improper authorization due to manipulation of the contactId argument. This flaw allows an attacker to remotely initiate unauthorized actions related to contact transfer operations without proper permission checks. The vulnerability does not require user interaction and can be exploited over the network with low attack complexity and no privileges required, though some level of limited privileges (PR:L) is indicated by the CVSS vector. The impact on confidentiality, integrity, and availability is limited but present, as unauthorized access to contact transfer operations could lead to unauthorized data manipulation or exposure within the CRM module. The vendor was notified but has not responded or provided a patch, and while the exploit has been publicly disclosed, there are no known exploits in the wild at this time. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to the combination of network attack vector, low complexity, no user interaction, and limited impact on system security properties.

Potential Impact

For European organizations using YunaiV yudao-cloud, particularly those relying on the CRM/contact management features, this vulnerability poses a risk of unauthorized data manipulation or unauthorized transfer of contact information. This could lead to data integrity issues, potential data leakage, and disruption of customer relationship management processes. Organizations in sectors such as finance, healthcare, and public administration, where contact data is sensitive and regulated under GDPR, may face compliance risks and reputational damage if this vulnerability is exploited. The lack of vendor response and patch availability increases the window of exposure. Attackers could leverage this vulnerability to escalate privileges within the CRM system or pivot to other internal systems if the compromised contact data is used for further social engineering or lateral movement.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement compensating controls immediately. These include: 1) Restricting network access to the yudao-cloud CRM module to trusted IP addresses and internal networks only, using firewalls or network segmentation. 2) Implementing strict monitoring and logging of all /crm/contact/transfer requests to detect anomalous or unauthorized activity. 3) Applying application-layer access controls or web application firewalls (WAFs) to validate and sanitize the contactId parameter and block suspicious requests. 4) Conducting regular audits of user permissions and roles within yudao-cloud to minimize privilege levels and reduce attack surface. 5) Preparing incident response plans specific to this vulnerability, including rapid isolation of affected systems if exploitation is detected. 6) Engaging with the vendor for updates and considering alternative CRM solutions if the vendor remains unresponsive. Once a patch is released, prioritize immediate deployment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-25T17:12:14.245Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d5da069e21be37e937d02b

Added to database: 9/26/2025, 12:10:46 AM

Last enriched: 10/3/2025, 12:45:02 AM

Last updated: 10/7/2025, 1:50:34 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats