Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12344: Unrestricted Upload in Yonyou U8 Cloud

0
Medium
VulnerabilityCVE-2025-12344cvecve-2025-12344
Published: Tue Oct 28 2025 (10/28/2025, 01:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Yonyou
Product: U8 Cloud

Description

A vulnerability has been found in Yonyou U8 Cloud up to 5.1sp. The impacted element is an unknown function of the file /service/NCloudGatewayServlet of the component Request Header Handler. Such manipulation of the argument ts/sign leads to unrestricted upload. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/28/2025, 02:08:02 UTC

Technical Analysis

CVE-2025-12344 is a vulnerability identified in Yonyou U8 Cloud, a widely used enterprise resource planning (ERP) cloud solution, affecting all versions up to 5.1sp. The vulnerability resides in the /service/NCloudGatewayServlet component, specifically in the handling of the ts/sign arguments within the request header handler. By manipulating these parameters, an attacker can perform an unrestricted file upload remotely without requiring authentication or user interaction. This unrestricted upload capability can allow an attacker to place malicious files on the server, potentially leading to remote code execution, data tampering, or denial of service depending on the uploaded payload and server configuration. The vulnerability has been publicly disclosed, but no official patch or vendor response has been provided, increasing the risk of exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploitability is rated as probable (E:P), suggesting that exploitation is feasible but may require some conditions. The lack of authentication and user interaction requirements makes this vulnerability particularly concerning for exposed cloud deployments. Given the critical role of ERP systems in business operations, exploitation could disrupt financial processes, supply chain management, and sensitive data confidentiality.

Potential Impact

For European organizations, the impact of CVE-2025-12344 could be significant due to the central role of ERP systems like Yonyou U8 Cloud in managing business-critical functions such as finance, procurement, and human resources. Successful exploitation could lead to unauthorized file uploads that enable attackers to execute arbitrary code, manipulate data integrity, or disrupt availability of services. This could result in financial losses, regulatory compliance violations (e.g., GDPR breaches due to data exposure), and reputational damage. The medium severity rating reflects moderate risk, but the absence of vendor patches and public exploit disclosure increases urgency. Organizations with cloud deployments accessible over the internet are at higher risk. The impact is exacerbated in sectors with stringent data protection requirements, such as finance, healthcare, and manufacturing. Additionally, supply chain disruptions caused by compromised ERP systems could have cascading effects across European markets. The vulnerability’s exploitation could also facilitate lateral movement within networks, increasing the scope of compromise.

Mitigation Recommendations

Given the lack of official patches, European organizations should implement immediate compensating controls to mitigate CVE-2025-12344. First, restrict network access to the /service/NCloudGatewayServlet endpoint using firewalls or web application firewalls (WAFs) to limit exposure to trusted IP addresses only. Second, implement strict input validation and sanitization on the ts/sign parameters at the application or proxy level to prevent malicious payloads. Third, monitor logs and network traffic for unusual upload activity or anomalous requests targeting the vulnerable servlet. Fourth, deploy endpoint detection and response (EDR) solutions to detect potential post-exploitation behaviors. Fifth, consider isolating the affected ERP environment from critical internal networks to contain potential breaches. Sixth, enforce strong authentication and authorization mechanisms around cloud management interfaces to reduce risk of privilege escalation. Finally, maintain regular backups of ERP data and configurations to enable recovery in case of compromise. Organizations should also engage with Yonyou support channels to seek updates or patches and stay informed on vulnerability developments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-27T13:58:08.578Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690021eeba6dffc5e22267fe

Added to database: 10/28/2025, 1:52:46 AM

Last enriched: 10/28/2025, 2:08:02 AM

Last updated: 10/28/2025, 5:58:46 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats