CVE-2025-14051: Improper Control of Dynamically-Identified Variables in youlaitech youlai-mall
A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14051 is a vulnerability identified in youlaitech's youlai-mall product versions 1.0.0 and 2.0.0, specifically impacting the getById, updateAddress, and deleteAddress functions located in the /mall-ums/app-api/v1/addresses/ API endpoint. The core issue stems from improper control over dynamically-identified variables, which allows an attacker to manipulate these variables remotely without requiring authentication or user interaction. This flaw can lead to unauthorized access or modification of address data, potentially compromising the confidentiality and integrity of user information. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:L), and no user interaction needed (UI:N). The CVSS 4.0 base score of 5.3 reflects a medium severity, with limited impact on confidentiality, integrity, and availability. The vendor was contacted early but did not respond or provide patches, and no exploits have been observed in the wild yet. The vulnerability's presence in critical address management functions within an e-commerce platform increases the risk of data tampering or unauthorized data retrieval, which could facilitate further attacks or fraud. The lack of vendor response necessitates proactive defensive measures by users of the affected software.
Potential Impact
For European organizations utilizing youlai-mall, this vulnerability poses a moderate risk to the confidentiality and integrity of customer address data. Exploitation could allow attackers to retrieve, modify, or delete address information remotely, potentially leading to fraudulent transactions, identity theft, or disruption of order fulfillment processes. The absence of authentication requirements lowers the barrier for attackers, increasing the likelihood of exploitation if the software is exposed to the internet. This could undermine customer trust and result in regulatory compliance issues under GDPR due to unauthorized access or alteration of personal data. Additionally, manipulation of address data could be leveraged as a pivot point for further attacks within the organization's network or supply chain. The medium severity rating suggests that while the vulnerability is not critical, it still warrants prompt remediation to avoid operational and reputational damage.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement several specific mitigations: 1) Apply strict input validation and sanitization on all parameters related to dynamically-identified variables in the affected API endpoints to prevent injection or manipulation attacks. 2) Employ runtime application self-protection (RASP) solutions to detect and block anomalous API calls targeting address management functions. 3) Restrict network exposure of the /mall-ums/app-api/v1/addresses/ endpoint by using firewalls or API gateways to limit access to trusted IPs or internal networks. 4) Monitor logs and set up alerts for unusual activity patterns such as repeated access to address modification functions or unexpected parameter values. 5) Conduct regular security assessments and code reviews focusing on dynamic variable handling in the application. 6) Engage with the vendor or community to obtain updates or patches, and consider upgrading to newer, secure versions if available. 7) Implement multi-factor authentication and role-based access controls around administrative functions to reduce the impact of potential exploitation. These targeted actions go beyond generic advice and address the specific nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-14051: Improper Control of Dynamically-Identified Variables in youlaitech youlai-mall
Description
A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14051 is a vulnerability identified in youlaitech's youlai-mall product versions 1.0.0 and 2.0.0, specifically impacting the getById, updateAddress, and deleteAddress functions located in the /mall-ums/app-api/v1/addresses/ API endpoint. The core issue stems from improper control over dynamically-identified variables, which allows an attacker to manipulate these variables remotely without requiring authentication or user interaction. This flaw can lead to unauthorized access or modification of address data, potentially compromising the confidentiality and integrity of user information. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:L), and no user interaction needed (UI:N). The CVSS 4.0 base score of 5.3 reflects a medium severity, with limited impact on confidentiality, integrity, and availability. The vendor was contacted early but did not respond or provide patches, and no exploits have been observed in the wild yet. The vulnerability's presence in critical address management functions within an e-commerce platform increases the risk of data tampering or unauthorized data retrieval, which could facilitate further attacks or fraud. The lack of vendor response necessitates proactive defensive measures by users of the affected software.
Potential Impact
For European organizations utilizing youlai-mall, this vulnerability poses a moderate risk to the confidentiality and integrity of customer address data. Exploitation could allow attackers to retrieve, modify, or delete address information remotely, potentially leading to fraudulent transactions, identity theft, or disruption of order fulfillment processes. The absence of authentication requirements lowers the barrier for attackers, increasing the likelihood of exploitation if the software is exposed to the internet. This could undermine customer trust and result in regulatory compliance issues under GDPR due to unauthorized access or alteration of personal data. Additionally, manipulation of address data could be leveraged as a pivot point for further attacks within the organization's network or supply chain. The medium severity rating suggests that while the vulnerability is not critical, it still warrants prompt remediation to avoid operational and reputational damage.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement several specific mitigations: 1) Apply strict input validation and sanitization on all parameters related to dynamically-identified variables in the affected API endpoints to prevent injection or manipulation attacks. 2) Employ runtime application self-protection (RASP) solutions to detect and block anomalous API calls targeting address management functions. 3) Restrict network exposure of the /mall-ums/app-api/v1/addresses/ endpoint by using firewalls or API gateways to limit access to trusted IPs or internal networks. 4) Monitor logs and set up alerts for unusual activity patterns such as repeated access to address modification functions or unexpected parameter values. 5) Conduct regular security assessments and code reviews focusing on dynamic variable handling in the application. 6) Engage with the vendor or community to obtain updates or patches, and consider upgrading to newer, secure versions if available. 7) Implement multi-factor authentication and role-based access controls around administrative functions to reduce the impact of potential exploitation. These targeted actions go beyond generic advice and address the specific nature of this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-04T17:12:49.723Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69320cc6c0111c5616350401
Added to database: 12/4/2025, 10:35:50 PM
Last enriched: 12/12/2025, 12:12:51 AM
Last updated: 1/19/2026, 2:24:48 AM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1132: SQL Injection in Yonyou KSOA
MediumCVE-2026-1131: SQL Injection in Yonyou KSOA
MediumCVE-2026-1130: SQL Injection in Yonyou KSOA
MediumCVE-2026-1129: SQL Injection in Yonyou KSOA
MediumCVE-2026-23829: CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection') in axllent mailpit
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.