CVE-2025-15086: Improper Access Controls in youlaitech youlai-mall
A weakness has been identified in youlaitech youlai-mall 1.0.0/2.0.0. This impacts the function getMemberByMobile of the file mall-ums/ums-boot/src/main/java/com/youlai/mall/ums/controller/app/MemberController.java. This manipulation causes improper access controls. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-15086 identifies an improper access control vulnerability in the youlaitech youlai-mall e-commerce platform, specifically affecting versions 1.0.0 and 2.0.0. The vulnerability resides in the getMemberByMobile function located in the mall-ums/ums-boot/src/main/java/com/youlai/mall/ums/controller/app/MemberController.java file. This function is responsible for retrieving member information based on a mobile number. Due to insufficient access control checks, an attacker can remotely invoke this function to access member data without proper authorization. The vulnerability does not require authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the ease of remote exploitation (attack vector: network), low attack complexity, and no privileges or user interaction needed. The vulnerability impacts confidentiality by potentially exposing sensitive member information but does not affect integrity or availability. The vendor was notified but has not issued a patch or response, and a public exploit is available, raising the urgency for mitigation. No known active exploitation in the wild has been reported yet.
Potential Impact
For European organizations using youlai-mall versions 1.0.0 or 2.0.0, this vulnerability poses a risk of unauthorized disclosure of member data, including potentially sensitive personal information linked to mobile numbers. This could lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. E-commerce platforms are critical for customer trust and business continuity; unauthorized data access could also facilitate further attacks such as phishing or identity theft. The lack of vendor response and public exploit availability increase the risk of exploitation by opportunistic attackers. Organizations relying on youlai-mall for customer management or sales may face operational disruptions if attackers leverage this vulnerability to extract or manipulate user data. The impact is primarily on confidentiality, but indirect effects on business integrity and customer trust are significant.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include restricting network access to the affected getMemberByMobile API endpoint using firewalls or API gateways, enforcing strict authentication and authorization checks at the application or proxy level, and monitoring logs for unusual access patterns to this function. Organizations should conduct code reviews and, if possible, apply custom patches to enforce proper access controls in the affected function. Additionally, sensitive data exposure can be minimized by masking or encrypting member data fields. Regular vulnerability scanning and penetration testing should be conducted to detect exploitation attempts. Organizations should also prepare incident response plans specific to this vulnerability and engage with the vendor for updates. Finally, consider migrating to alternative platforms or updated versions once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-15086: Improper Access Controls in youlaitech youlai-mall
Description
A weakness has been identified in youlaitech youlai-mall 1.0.0/2.0.0. This impacts the function getMemberByMobile of the file mall-ums/ums-boot/src/main/java/com/youlai/mall/ums/controller/app/MemberController.java. This manipulation causes improper access controls. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-15086 identifies an improper access control vulnerability in the youlaitech youlai-mall e-commerce platform, specifically affecting versions 1.0.0 and 2.0.0. The vulnerability resides in the getMemberByMobile function located in the mall-ums/ums-boot/src/main/java/com/youlai/mall/ums/controller/app/MemberController.java file. This function is responsible for retrieving member information based on a mobile number. Due to insufficient access control checks, an attacker can remotely invoke this function to access member data without proper authorization. The vulnerability does not require authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the ease of remote exploitation (attack vector: network), low attack complexity, and no privileges or user interaction needed. The vulnerability impacts confidentiality by potentially exposing sensitive member information but does not affect integrity or availability. The vendor was notified but has not issued a patch or response, and a public exploit is available, raising the urgency for mitigation. No known active exploitation in the wild has been reported yet.
Potential Impact
For European organizations using youlai-mall versions 1.0.0 or 2.0.0, this vulnerability poses a risk of unauthorized disclosure of member data, including potentially sensitive personal information linked to mobile numbers. This could lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. E-commerce platforms are critical for customer trust and business continuity; unauthorized data access could also facilitate further attacks such as phishing or identity theft. The lack of vendor response and public exploit availability increase the risk of exploitation by opportunistic attackers. Organizations relying on youlai-mall for customer management or sales may face operational disruptions if attackers leverage this vulnerability to extract or manipulate user data. The impact is primarily on confidentiality, but indirect effects on business integrity and customer trust are significant.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include restricting network access to the affected getMemberByMobile API endpoint using firewalls or API gateways, enforcing strict authentication and authorization checks at the application or proxy level, and monitoring logs for unusual access patterns to this function. Organizations should conduct code reviews and, if possible, apply custom patches to enforce proper access controls in the affected function. Additionally, sensitive data exposure can be minimized by masking or encrypting member data fields. Regular vulnerability scanning and penetration testing should be conducted to detect exploitation attempts. Organizations should also prepare incident response plans specific to this vulnerability and engage with the vendor for updates. Finally, consider migrating to alternative platforms or updated versions once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-25T09:50:02.863Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694da1bc9e3e753cc3176e7e
Added to database: 12/25/2025, 8:42:36 PM
Last enriched: 12/25/2025, 8:42:53 PM
Last updated: 12/25/2025, 11:35:16 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14913: CWE-862 Missing Authorization in wpshuffle Frontend Post Submission Manager Lite – Frontend Posting WordPress Plugin
MediumCVE-2025-15089: Buffer Overflow in UTT 进取 512W
HighCVE-2025-14820
UnknownCVE-2025-14715
UnknownCVE-2025-15088: SQL Injection in ketr JEPaaS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.