Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15084: Improper Access Controls in youlaitech youlai-mall

0
Low
VulnerabilityCVE-2025-15084cvecve-2025-15084
Published: Thu Dec 25 2025 (12/25/2025, 18:32:05 UTC)
Source: CVE Database V5
Vendor/Project: youlaitech
Product: youlai-mall

Description

A vulnerability was identified in youlaitech youlai-mall 1.0.0/2.0.0. The impacted element is the function orderService.payOrder of the file mall-oms/oms-boot/src/main/java/com/youlai/mall/oms/controller/app/OrderController.java of the component Order Payment Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitability is regarded as difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/01/2026, 22:31:13 UTC

Technical Analysis

CVE-2025-15084 identifies an improper access control vulnerability in the youlaitech youlai-mall e-commerce platform, versions 1.0.0 and 2.0.0. The flaw resides in the orderService.payOrder function within the Order Payment Handler component, specifically in the Java source file mall-oms/oms-boot/src/main/java/com/youlai/mall/oms/controller/app/OrderController.java. This vulnerability allows a remote attacker to manipulate the payment process due to insufficient access control checks. Exploiting this flaw does not require user interaction but does require low privileges and is considered of high complexity, making exploitation difficult. The CVSS 4.0 vector (AV:N/AC:H/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P) indicates network attack vector, high attack complexity, low privileges, no user interaction, no confidentiality or availability impact, and low integrity impact. The vendor was contacted but did not respond, and no patches or mitigations have been published. No known exploits are currently active in the wild. The vulnerability could potentially allow unauthorized payment manipulations, but the limited impact and complexity reduce the immediate risk.

Potential Impact

For European organizations using youlai-mall versions 1.0.0 or 2.0.0, this vulnerability could allow unauthorized manipulation of payment orders, potentially leading to financial discrepancies or fraud. However, the low CVSS score and high attack complexity suggest a limited likelihood of successful exploitation. The impact on confidentiality and availability is negligible, and integrity impact is low, meaning critical data leakage or service disruption is unlikely. Still, organizations handling sensitive payment data should be cautious, as any unauthorized payment manipulation could undermine customer trust and regulatory compliance, especially under GDPR and PCI DSS frameworks. The lack of vendor response and patches increases the risk of prolonged exposure. European e-commerce platforms with similar architectures might also be indirectly affected if they integrate or rely on youlai-mall components.

Mitigation Recommendations

Organizations should conduct a thorough code review of the orderService.payOrder function and related access control mechanisms to ensure proper authorization checks are enforced. Implement strict role-based access controls (RBAC) around payment processing functions and monitor payment transaction logs for anomalies. Employ network segmentation and firewall rules to limit access to the order payment handler endpoints. Since no official patches are available, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious payment manipulation attempts. Engage in proactive threat hunting focused on payment-related activities. Maintain up-to-date backups and incident response plans tailored to payment fraud scenarios. Finally, monitor vendor communications for any future patches or advisories and plan for timely updates once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-25T09:49:51.756Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694d87052ffa995e0cff37ad

Added to database: 12/25/2025, 6:48:37 PM

Last enriched: 1/1/2026, 10:31:13 PM

Last updated: 2/5/2026, 11:54:11 PM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats