Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15098: Server-Side Request Forgery in YunaiV yudao-cloud

0
Medium
VulnerabilityCVE-2025-15098cvecve-2025-15098
Published: Fri Dec 26 2025 (12/26/2025, 03:02:06 UTC)
Source: CVE Database V5
Vendor/Project: YunaiV
Product: yudao-cloud

Description

A vulnerability was determined in YunaiV yudao-cloud up to 2025.11. This affects the function BpmHttpCallbackTrigger/BpmSyncHttpRequestTrigger of the component Business Process Management. Executing manipulation of the argument url/header/body can lead to server-side request forgery. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/26/2025, 03:30:34 UTC

Technical Analysis

CVE-2025-15098 is a Server-Side Request Forgery (SSRF) vulnerability identified in the YunaiV yudao-cloud product, specifically affecting the Business Process Management (BPM) component's functions BpmHttpCallbackTrigger and BpmSyncHttpRequestTrigger. These functions accept URL, header, and body parameters that are insufficiently validated, allowing an attacker to manipulate these inputs to coerce the server into making arbitrary HTTP requests. Such SSRF vulnerabilities enable attackers to bypass network access controls, potentially reaching internal or protected resources that are not directly accessible externally. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing the risk profile. The affected versions span from 2025.0 through 2025.11, indicating a broad window of exposure. Despite early notification, the vendor has not issued patches or advisories, and no public exploits have been observed yet. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability, resulting in a medium severity rating. The lack of authentication and ease of exploitation make this a significant concern for organizations relying on yudao-cloud BPM for critical workflows. The vulnerability could be leveraged to perform reconnaissance, access internal APIs, or exfiltrate sensitive data by abusing the server's network privileges.

Potential Impact

For European organizations, this SSRF vulnerability poses a risk of unauthorized internal network access, potentially exposing sensitive internal services, databases, or cloud metadata endpoints. Organizations using yudao-cloud BPM in sectors such as finance, manufacturing, healthcare, or government could face data breaches, operational disruptions, or lateral movement by attackers. The ability to perform SSRF without authentication or user interaction increases the likelihood of automated exploitation attempts. Given the vendor's lack of response, organizations may remain exposed for extended periods, increasing risk exposure. The impact on confidentiality is moderate due to potential data leakage, while integrity and availability impacts are lower but possible if internal services are manipulated or overwhelmed. The vulnerability could also facilitate further attacks, such as privilege escalation or pivoting within corporate networks. European entities with complex BPM workflows relying on yudao-cloud may experience operational risks if attackers exploit this flaw to disrupt business processes or access proprietary information.

Mitigation Recommendations

1. Implement strict input validation and sanitization on all URL, header, and body parameters accepted by the BPM triggers to prevent injection of malicious requests. 2. Employ network segmentation and firewall rules to restrict the yudao-cloud server's outbound HTTP requests to only trusted and necessary endpoints, blocking access to internal or sensitive resources. 3. Monitor and log all outbound HTTP requests from the BPM component to detect anomalous or unexpected destinations indicative of SSRF exploitation attempts. 4. Use web application firewalls (WAF) with custom rules to detect and block SSRF attack patterns targeting the vulnerable functions. 5. If possible, isolate the BPM service in a dedicated environment with limited network privileges to minimize the impact of potential SSRF exploitation. 6. Engage with the vendor or community to obtain patches or updates and apply them promptly once available. 7. Conduct regular security assessments and penetration testing focusing on SSRF vectors within BPM workflows. 8. Educate development and operations teams about SSRF risks and secure coding practices related to HTTP request handling.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-25T16:08:17.380Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694dfdd590f5ab8d8496eb41

Added to database: 12/26/2025, 3:15:33 AM

Last enriched: 12/26/2025, 3:30:34 AM

Last updated: 12/26/2025, 6:34:27 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats