CVE-2025-14086: Improper Access Controls in youlaitech youlai-mall
A vulnerability was found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is an unknown function of the file /app-api/v1/members/openid/. The manipulation of the argument openid results in improper access controls. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14086 is a vulnerability identified in the youlaitech youlai-mall e-commerce platform versions 1.0.0 and 2.0.0. The issue resides in an unspecified function within the /app-api/v1/members/openid/ endpoint, where improper access control occurs due to insufficient validation or authorization checks on the 'openid' parameter. This flaw allows a remote attacker to manipulate the 'openid' argument to bypass access controls, potentially gaining unauthorized access to member-related resources or data. The vulnerability does not require user interaction or prior authentication, making it remotely exploitable with low attack complexity. The vendor was notified early but has not issued any response or patch, and no known exploits are currently observed in the wild. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). This suggests that while the vulnerability can be exploited remotely, the impact on system security is moderate rather than critical. The lack of vendor response and patch availability increases the risk for organizations relying on this software, as attackers could develop exploits based on the public disclosure. The vulnerability highlights the importance of robust access control mechanisms in API endpoints, especially those handling sensitive member information.
Potential Impact
For European organizations using youlai-mall, this vulnerability poses a moderate risk of unauthorized access to member data or manipulation of user-related functions. The improper access control could lead to confidentiality breaches, exposing personal or transactional data, which may violate GDPR and other data protection regulations, potentially resulting in legal and financial penalties. Integrity of data could be compromised if attackers modify member information or transaction records, impacting business operations and customer trust. Availability impact is likely limited but cannot be ruled out if the vulnerability is leveraged to disrupt service or escalate attacks. The remote exploitability without user interaction or elevated privileges increases the threat surface, especially for organizations with public-facing APIs. Given the vendor's lack of response, organizations must assume the vulnerability remains unpatched, increasing the urgency for internal mitigations. The impact is particularly significant for e-commerce platforms handling sensitive customer data and payment information, common in European markets. Failure to address this vulnerability could lead to reputational damage and operational disruptions.
Mitigation Recommendations
Since no official patch is available, European organizations should implement compensating controls immediately. First, enforce strict input validation and sanitization on the 'openid' parameter at the API gateway or application layer to prevent unauthorized manipulation. Deploy Web Application Firewalls (WAFs) with custom rules targeting suspicious or anomalous requests to the /app-api/v1/members/openid/ endpoint. Conduct thorough access control reviews and implement role-based access controls (RBAC) to ensure minimal privileges are granted to API consumers. Monitor API logs continuously for unusual access patterns or repeated attempts to manipulate the 'openid' parameter, enabling rapid detection and response. Consider isolating or restricting access to the vulnerable API endpoint through network segmentation or IP whitelisting where feasible. Engage in threat hunting exercises to identify any signs of exploitation attempts. Plan for rapid patch deployment once the vendor releases a fix or consider alternative software solutions if the vendor remains unresponsive. Additionally, educate development and security teams about secure API design principles to prevent similar issues in the future.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-14086: Improper Access Controls in youlaitech youlai-mall
Description
A vulnerability was found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is an unknown function of the file /app-api/v1/members/openid/. The manipulation of the argument openid results in improper access controls. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14086 is a vulnerability identified in the youlaitech youlai-mall e-commerce platform versions 1.0.0 and 2.0.0. The issue resides in an unspecified function within the /app-api/v1/members/openid/ endpoint, where improper access control occurs due to insufficient validation or authorization checks on the 'openid' parameter. This flaw allows a remote attacker to manipulate the 'openid' argument to bypass access controls, potentially gaining unauthorized access to member-related resources or data. The vulnerability does not require user interaction or prior authentication, making it remotely exploitable with low attack complexity. The vendor was notified early but has not issued any response or patch, and no known exploits are currently observed in the wild. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). This suggests that while the vulnerability can be exploited remotely, the impact on system security is moderate rather than critical. The lack of vendor response and patch availability increases the risk for organizations relying on this software, as attackers could develop exploits based on the public disclosure. The vulnerability highlights the importance of robust access control mechanisms in API endpoints, especially those handling sensitive member information.
Potential Impact
For European organizations using youlai-mall, this vulnerability poses a moderate risk of unauthorized access to member data or manipulation of user-related functions. The improper access control could lead to confidentiality breaches, exposing personal or transactional data, which may violate GDPR and other data protection regulations, potentially resulting in legal and financial penalties. Integrity of data could be compromised if attackers modify member information or transaction records, impacting business operations and customer trust. Availability impact is likely limited but cannot be ruled out if the vulnerability is leveraged to disrupt service or escalate attacks. The remote exploitability without user interaction or elevated privileges increases the threat surface, especially for organizations with public-facing APIs. Given the vendor's lack of response, organizations must assume the vulnerability remains unpatched, increasing the urgency for internal mitigations. The impact is particularly significant for e-commerce platforms handling sensitive customer data and payment information, common in European markets. Failure to address this vulnerability could lead to reputational damage and operational disruptions.
Mitigation Recommendations
Since no official patch is available, European organizations should implement compensating controls immediately. First, enforce strict input validation and sanitization on the 'openid' parameter at the API gateway or application layer to prevent unauthorized manipulation. Deploy Web Application Firewalls (WAFs) with custom rules targeting suspicious or anomalous requests to the /app-api/v1/members/openid/ endpoint. Conduct thorough access control reviews and implement role-based access controls (RBAC) to ensure minimal privileges are granted to API consumers. Monitor API logs continuously for unusual access patterns or repeated attempts to manipulate the 'openid' parameter, enabling rapid detection and response. Consider isolating or restricting access to the vulnerable API endpoint through network segmentation or IP whitelisting where feasible. Engage in threat hunting exercises to identify any signs of exploitation attempts. Plan for rapid patch deployment once the vendor releases a fix or consider alternative software solutions if the vendor remains unresponsive. Additionally, educate development and security teams about secure API design principles to prevent similar issues in the future.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-05T08:35:06.972Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6932e8f6f88dbe026ce496ab
Added to database: 12/5/2025, 2:15:18 PM
Last enriched: 12/12/2025, 3:21:48 PM
Last updated: 1/19/2026, 8:43:16 PM
Views: 85
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23852: CWE-94: Improper Control of Generation of Code ('Code Injection') in siyuan-note siyuan
MediumCVE-2026-1174: Resource Consumption in birkir prime
MediumCVE-2026-23837: CWE-863: Incorrect Authorization in franklioxygen MyTube
CriticalCVE-2026-23851: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan
HighCVE-2026-23850: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in siyuan-note siyuan
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.