Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14085: Improper Control of Dynamically-Identified Variables in youlaitech youlai-mall

0
Medium
VulnerabilityCVE-2025-14085cvecve-2025-14085
Published: Fri Dec 05 2025 (12/05/2025, 14:02:05 UTC)
Source: CVE Database V5
Vendor/Project: youlaitech
Product: youlai-mall

Description

A vulnerability has been found in youlaitech youlai-mall 1.0.0/2.0.0. This impacts an unknown function of the file /app-api/v1/orders/. The manipulation of the argument orderId leads to improper control of dynamically-identified variables. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/12/2025, 15:21:33 UTC

Technical Analysis

CVE-2025-14085 is a vulnerability identified in the youlaitech youlai-mall e-commerce platform versions 1.0.0 and 2.0.0. The issue arises from improper control of dynamically-identified variables within the /app-api/v1/orders/ endpoint, specifically through manipulation of the orderId argument. Dynamically-identified variables refer to variables whose names or references are constructed or resolved at runtime, often based on user input or other dynamic data. Improper control means that an attacker can influence which variables are accessed or modified, potentially leading to unauthorized actions or data corruption. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The CVSS 4.0 score of 5.3 (medium severity) reflects that the attack vector is network-based with low attack complexity and no privileges or user interaction needed, but the impact on confidentiality, integrity, and availability is limited. The vendor was contacted but did not respond, and no patches have been released, leaving systems exposed. While no known exploits are currently active in the wild, public disclosure means attackers could develop exploits. The vulnerability could allow attackers to manipulate order data, potentially leading to fraudulent transactions, data leakage, or disruption of order processing. The lack of vendor response and patches necessitates immediate mitigation by affected organizations.

Potential Impact

For European organizations, the vulnerability poses risks to the integrity and confidentiality of order processing data within the youlai-mall platform. Attackers could manipulate orderId parameters to alter order details, potentially enabling fraudulent orders, unauthorized access to customer data, or disruption of e-commerce operations. This could damage customer trust, lead to financial losses, and violate data protection regulations such as GDPR. The availability impact is limited but could manifest if order processing is disrupted. Given the remote exploitability without authentication, attackers could target exposed API endpoints over the internet. Organizations relying on youlai-mall for critical e-commerce functions in Europe, especially those with high transaction volumes, face increased operational and reputational risks. The absence of vendor patches increases the urgency for internal mitigations and monitoring to prevent exploitation.

Mitigation Recommendations

1. Implement strict input validation and sanitization on the orderId parameter to ensure only expected formats and values are accepted, preventing manipulation of dynamically-identified variables. 2. Apply runtime application self-protection (RASP) or web application firewall (WAF) rules to detect and block anomalous requests targeting the /app-api/v1/orders/ endpoint. 3. Conduct code reviews and static analysis to identify and refactor any dynamic variable usage patterns that could be exploited. 4. Restrict API access through network segmentation and IP whitelisting where feasible to limit exposure. 5. Monitor logs for unusual activity related to orderId parameters or order processing anomalies. 6. Prepare incident response plans specific to e-commerce fraud or data manipulation scenarios. 7. Engage with the vendor or community to track patch releases or alternative secure versions. 8. Consider temporary disabling or restricting the vulnerable API endpoint if business operations allow until a patch is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-05T08:35:03.860Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6932e8f6f88dbe026ce496a5

Added to database: 12/5/2025, 2:15:18 PM

Last enriched: 12/12/2025, 3:21:33 PM

Last updated: 1/19/2026, 8:40:42 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats