CVE-2025-15098: Server-Side Request Forgery in YunaiV yudao-cloud
A vulnerability was determined in YunaiV yudao-cloud up to 2025.11. This affects the function BpmHttpCallbackTrigger/BpmSyncHttpRequestTrigger of the component Business Process Management. Executing manipulation of the argument url/header/body can lead to server-side request forgery. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-15098 is a Server-Side Request Forgery (SSRF) vulnerability identified in the YunaiV yudao-cloud product, specifically affecting the Business Process Management (BPM) component's functions BpmHttpCallbackTrigger and BpmSyncHttpRequestTrigger. These functions accept URL, header, and body parameters that are insufficiently validated, allowing an attacker to manipulate these inputs to coerce the server into making arbitrary HTTP requests. Such SSRF vulnerabilities enable attackers to bypass network access controls, potentially reaching internal or protected resources that are not directly accessible externally. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing the risk profile. The affected versions span from 2025.0 through 2025.11, indicating a broad window of exposure. Despite early notification, the vendor has not issued patches or advisories, and no public exploits have been observed yet. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability, resulting in a medium severity rating. The lack of authentication and ease of exploitation make this a significant concern for organizations relying on yudao-cloud BPM for critical workflows. The vulnerability could be leveraged to perform reconnaissance, access internal APIs, or exfiltrate sensitive data by abusing the server's network privileges.
Potential Impact
For European organizations, this SSRF vulnerability poses a risk of unauthorized internal network access, potentially exposing sensitive internal services, databases, or cloud metadata endpoints. Organizations using yudao-cloud BPM in sectors such as finance, manufacturing, healthcare, or government could face data breaches, operational disruptions, or lateral movement by attackers. The ability to perform SSRF without authentication or user interaction increases the likelihood of automated exploitation attempts. Given the vendor's lack of response, organizations may remain exposed for extended periods, increasing risk exposure. The impact on confidentiality is moderate due to potential data leakage, while integrity and availability impacts are lower but possible if internal services are manipulated or overwhelmed. The vulnerability could also facilitate further attacks, such as privilege escalation or pivoting within corporate networks. European entities with complex BPM workflows relying on yudao-cloud may experience operational risks if attackers exploit this flaw to disrupt business processes or access proprietary information.
Mitigation Recommendations
1. Implement strict input validation and sanitization on all URL, header, and body parameters accepted by the BPM triggers to prevent injection of malicious requests. 2. Employ network segmentation and firewall rules to restrict the yudao-cloud server's outbound HTTP requests to only trusted and necessary endpoints, blocking access to internal or sensitive resources. 3. Monitor and log all outbound HTTP requests from the BPM component to detect anomalous or unexpected destinations indicative of SSRF exploitation attempts. 4. Use web application firewalls (WAF) with custom rules to detect and block SSRF attack patterns targeting the vulnerable functions. 5. If possible, isolate the BPM service in a dedicated environment with limited network privileges to minimize the impact of potential SSRF exploitation. 6. Engage with the vendor or community to obtain patches or updates and apply them promptly once available. 7. Conduct regular security assessments and penetration testing focusing on SSRF vectors within BPM workflows. 8. Educate development and operations teams about SSRF risks and secure coding practices related to HTTP request handling.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-15098: Server-Side Request Forgery in YunaiV yudao-cloud
Description
A vulnerability was determined in YunaiV yudao-cloud up to 2025.11. This affects the function BpmHttpCallbackTrigger/BpmSyncHttpRequestTrigger of the component Business Process Management. Executing manipulation of the argument url/header/body can lead to server-side request forgery. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-15098 is a Server-Side Request Forgery (SSRF) vulnerability identified in the YunaiV yudao-cloud product, specifically affecting the Business Process Management (BPM) component's functions BpmHttpCallbackTrigger and BpmSyncHttpRequestTrigger. These functions accept URL, header, and body parameters that are insufficiently validated, allowing an attacker to manipulate these inputs to coerce the server into making arbitrary HTTP requests. Such SSRF vulnerabilities enable attackers to bypass network access controls, potentially reaching internal or protected resources that are not directly accessible externally. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing the risk profile. The affected versions span from 2025.0 through 2025.11, indicating a broad window of exposure. Despite early notification, the vendor has not issued patches or advisories, and no public exploits have been observed yet. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability, resulting in a medium severity rating. The lack of authentication and ease of exploitation make this a significant concern for organizations relying on yudao-cloud BPM for critical workflows. The vulnerability could be leveraged to perform reconnaissance, access internal APIs, or exfiltrate sensitive data by abusing the server's network privileges.
Potential Impact
For European organizations, this SSRF vulnerability poses a risk of unauthorized internal network access, potentially exposing sensitive internal services, databases, or cloud metadata endpoints. Organizations using yudao-cloud BPM in sectors such as finance, manufacturing, healthcare, or government could face data breaches, operational disruptions, or lateral movement by attackers. The ability to perform SSRF without authentication or user interaction increases the likelihood of automated exploitation attempts. Given the vendor's lack of response, organizations may remain exposed for extended periods, increasing risk exposure. The impact on confidentiality is moderate due to potential data leakage, while integrity and availability impacts are lower but possible if internal services are manipulated or overwhelmed. The vulnerability could also facilitate further attacks, such as privilege escalation or pivoting within corporate networks. European entities with complex BPM workflows relying on yudao-cloud may experience operational risks if attackers exploit this flaw to disrupt business processes or access proprietary information.
Mitigation Recommendations
1. Implement strict input validation and sanitization on all URL, header, and body parameters accepted by the BPM triggers to prevent injection of malicious requests. 2. Employ network segmentation and firewall rules to restrict the yudao-cloud server's outbound HTTP requests to only trusted and necessary endpoints, blocking access to internal or sensitive resources. 3. Monitor and log all outbound HTTP requests from the BPM component to detect anomalous or unexpected destinations indicative of SSRF exploitation attempts. 4. Use web application firewalls (WAF) with custom rules to detect and block SSRF attack patterns targeting the vulnerable functions. 5. If possible, isolate the BPM service in a dedicated environment with limited network privileges to minimize the impact of potential SSRF exploitation. 6. Engage with the vendor or community to obtain patches or updates and apply them promptly once available. 7. Conduct regular security assessments and penetration testing focusing on SSRF vectors within BPM workflows. 8. Educate development and operations teams about SSRF risks and secure coding practices related to HTTP request handling.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-25T16:08:17.380Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694dfdd590f5ab8d8496eb41
Added to database: 12/26/2025, 3:15:33 AM
Last enriched: 12/26/2025, 3:30:34 AM
Last updated: 12/26/2025, 6:34:27 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62578: CWE-319 Cleartext Transmission of Sensitive Information in Delta Electronics DVP-12SE
HighCVE-2025-8075: CWE-20 Improper Input Validation in Hanwha Vision Co., Ltd. QNV-C8012
MediumCVE-2025-52601: CWE-321: Use of Hard-coded Cryptographic Key in Hanwha Vision Co., Ltd. Device Manager
MediumCVE-2025-52600: CWE-20 Improper Input Validation in Hanwha Vision Co., Ltd. QNV-C8012
MediumCVE-2025-52599: CWE-269 Improper Privilege Management in Hanwha Vision Co., Ltd. QNV-C8012
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.