Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14051: Improper Control of Dynamically-Identified Variables in youlaitech youlai-mall

0
Medium
VulnerabilityCVE-2025-14051cvecve-2025-14051
Published: Thu Dec 04 2025 (12/04/2025, 22:32:06 UTC)
Source: CVE Database V5
Vendor/Project: youlaitech
Product: youlai-mall

Description

A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/12/2025, 00:12:51 UTC

Technical Analysis

CVE-2025-14051 is a vulnerability identified in youlaitech's youlai-mall product versions 1.0.0 and 2.0.0, specifically impacting the getById, updateAddress, and deleteAddress functions located in the /mall-ums/app-api/v1/addresses/ API endpoint. The core issue stems from improper control over dynamically-identified variables, which allows an attacker to manipulate these variables remotely without requiring authentication or user interaction. This flaw can lead to unauthorized access or modification of address data, potentially compromising the confidentiality and integrity of user information. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:L), and no user interaction needed (UI:N). The CVSS 4.0 base score of 5.3 reflects a medium severity, with limited impact on confidentiality, integrity, and availability. The vendor was contacted early but did not respond or provide patches, and no exploits have been observed in the wild yet. The vulnerability's presence in critical address management functions within an e-commerce platform increases the risk of data tampering or unauthorized data retrieval, which could facilitate further attacks or fraud. The lack of vendor response necessitates proactive defensive measures by users of the affected software.

Potential Impact

For European organizations utilizing youlai-mall, this vulnerability poses a moderate risk to the confidentiality and integrity of customer address data. Exploitation could allow attackers to retrieve, modify, or delete address information remotely, potentially leading to fraudulent transactions, identity theft, or disruption of order fulfillment processes. The absence of authentication requirements lowers the barrier for attackers, increasing the likelihood of exploitation if the software is exposed to the internet. This could undermine customer trust and result in regulatory compliance issues under GDPR due to unauthorized access or alteration of personal data. Additionally, manipulation of address data could be leveraged as a pivot point for further attacks within the organization's network or supply chain. The medium severity rating suggests that while the vulnerability is not critical, it still warrants prompt remediation to avoid operational and reputational damage.

Mitigation Recommendations

Given the lack of official patches, European organizations should implement several specific mitigations: 1) Apply strict input validation and sanitization on all parameters related to dynamically-identified variables in the affected API endpoints to prevent injection or manipulation attacks. 2) Employ runtime application self-protection (RASP) solutions to detect and block anomalous API calls targeting address management functions. 3) Restrict network exposure of the /mall-ums/app-api/v1/addresses/ endpoint by using firewalls or API gateways to limit access to trusted IPs or internal networks. 4) Monitor logs and set up alerts for unusual activity patterns such as repeated access to address modification functions or unexpected parameter values. 5) Conduct regular security assessments and code reviews focusing on dynamic variable handling in the application. 6) Engage with the vendor or community to obtain updates or patches, and consider upgrading to newer, secure versions if available. 7) Implement multi-factor authentication and role-based access controls around administrative functions to reduce the impact of potential exploitation. These targeted actions go beyond generic advice and address the specific nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-04T17:12:49.723Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69320cc6c0111c5616350401

Added to database: 12/4/2025, 10:35:50 PM

Last enriched: 12/12/2025, 12:12:51 AM

Last updated: 1/19/2026, 2:24:48 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats