Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15087: Improper Authorization in youlaitech youlai-mall

0
Medium
VulnerabilityCVE-2025-15087cvecve-2025-15087
Published: Thu Dec 25 2025 (12/25/2025, 21:02:07 UTC)
Source: CVE Database V5
Vendor/Project: youlaitech
Product: youlai-mall

Description

A security vulnerability has been detected in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function submitOrderPayment of the file mall-oms/oms-boot/src/main/java/com/youlai/mall/oms/controller/app/OrderController.java. Such manipulation of the argument orderSn leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 01/01/2026, 22:32:12 UTC

Technical Analysis

CVE-2025-15087 identifies an improper authorization vulnerability in the youlaitech youlai-mall e-commerce platform versions 1.0.0 and 2.0.0. The vulnerability is located in the submitOrderPayment method within the OrderController.java source file. The core issue stems from insufficient validation of the orderSn argument, which is used to identify orders during payment submission. An attacker can manipulate this parameter remotely without authentication or user interaction, potentially allowing unauthorized access to payment submission functionality for orders they do not own or control. This could lead to unauthorized payment processing, order manipulation, or disruption of transaction workflows. The CVSS 4.0 score of 5.3 (medium severity) reflects the network attack vector, low attack complexity, no privileges required, and no user interaction needed, but with limited impact on confidentiality and availability and low integrity impact. The vendor has not issued a patch or responded to the disclosure, and while a public exploit exists, there is no evidence of active exploitation in the wild. The vulnerability highlights a common security oversight in e-commerce platforms where parameter tampering can bypass authorization checks, emphasizing the need for robust server-side validation and access control mechanisms.

Potential Impact

For European organizations using youlai-mall, this vulnerability could lead to unauthorized manipulation of order payments, potentially resulting in financial losses, fraudulent transactions, and disruption of business operations. The integrity of order processing is compromised, which may also affect customer trust and brand reputation. Since the vulnerability can be exploited remotely without authentication, attackers could target multiple organizations at scale. The lack of vendor response and patch availability increases exposure duration. Organizations in sectors heavily reliant on e-commerce, such as retail and logistics, are particularly at risk. Additionally, regulatory compliance risks may arise if unauthorized transactions lead to data protection or financial reporting issues under GDPR or other European regulations.

Mitigation Recommendations

Organizations should immediately conduct a thorough code review of the submitOrderPayment function and related order processing logic to ensure strict authorization checks are enforced on the orderSn parameter. Implement server-side validation to verify that the requesting user is authorized to perform payment operations on the specified order. Employ strong access control mechanisms, such as role-based access control (RBAC) or attribute-based access control (ABAC), to restrict payment submission functionality. Monitor logs and transaction records for unusual or unauthorized order payment activities. If possible, isolate or disable the vulnerable functionality until a vendor patch or official fix is available. Engage with the vendor for updates and consider applying custom patches or workarounds to mitigate risk. Additionally, implement multi-factor authentication and anomaly detection on e-commerce platforms to reduce the risk of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-25T09:50:06.616Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694da8ba9e3e753cc31e3817

Added to database: 12/25/2025, 9:12:26 PM

Last enriched: 1/1/2026, 10:32:12 PM

Last updated: 2/7/2026, 10:41:28 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats