CVE-2025-66735: n/a
youlai-boot V2.21.1 is vulnerable to Incorrect Access Control. The getRoleForm function in SysRoleController.java does not perform permission checks, which may allow non-root users to directly access root roles.
AI Analysis
Technical Summary
CVE-2025-66735 identifies an incorrect access control vulnerability in youlai-boot version 2.21.1, specifically within the getRoleForm function of the SysRoleController.java component. The vulnerability arises because this function fails to perform necessary permission checks before granting access to role information. As a result, non-root users can directly access root roles, which should normally be restricted. This flaw corresponds to CWE-284 (Improper Access Control) and CWE-862 (Missing Authorization). The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects confidentiality by exposing sensitive role data, but does not affect integrity or availability. No patches or exploit code are currently available, and no known exploits have been observed in the wild. However, the vulnerability poses a significant risk because unauthorized access to root roles can facilitate privilege escalation or lateral movement within affected systems. The lack of permission checks suggests a design or implementation oversight in the access control logic of youlai-boot's role management. Organizations using this software should audit their deployments and apply fixes once available to prevent unauthorized role access.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of privileged role information, undermining internal security controls and enabling attackers or malicious insiders to escalate privileges or gain unauthorized access to sensitive systems. This is particularly critical for sectors handling sensitive data such as finance, healthcare, and government, where role-based access controls are fundamental to regulatory compliance (e.g., GDPR). Exposure of root roles could facilitate further attacks, including data breaches or disruption of critical services. Since the vulnerability does not require authentication, it increases the attack surface and risk of exploitation from external threat actors. The confidentiality breach could also erode trust and lead to financial and reputational damage. Organizations relying on youlai-boot for identity and access management or internal role administration are at heightened risk.
Mitigation Recommendations
Immediate mitigation should focus on restricting network access to the SysRoleController endpoints, using firewalls or web application firewalls (WAFs) to limit exposure to trusted administrators only. Organizations should conduct thorough code reviews and implement strict permission checks in the getRoleForm function to ensure only authorized root users can access root roles. Until an official patch is released, consider deploying compensating controls such as enhanced logging and monitoring of role access requests to detect suspicious activity. Employ network segmentation to isolate critical systems using youlai-boot and enforce the principle of least privilege across all user accounts. Additionally, conduct security awareness training for administrators to recognize potential misuse of role access. Once a patch is available, prioritize its deployment in all affected environments. Regularly audit role assignments and access logs to identify and remediate unauthorized access attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-66735: n/a
Description
youlai-boot V2.21.1 is vulnerable to Incorrect Access Control. The getRoleForm function in SysRoleController.java does not perform permission checks, which may allow non-root users to directly access root roles.
AI-Powered Analysis
Technical Analysis
CVE-2025-66735 identifies an incorrect access control vulnerability in youlai-boot version 2.21.1, specifically within the getRoleForm function of the SysRoleController.java component. The vulnerability arises because this function fails to perform necessary permission checks before granting access to role information. As a result, non-root users can directly access root roles, which should normally be restricted. This flaw corresponds to CWE-284 (Improper Access Control) and CWE-862 (Missing Authorization). The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects confidentiality by exposing sensitive role data, but does not affect integrity or availability. No patches or exploit code are currently available, and no known exploits have been observed in the wild. However, the vulnerability poses a significant risk because unauthorized access to root roles can facilitate privilege escalation or lateral movement within affected systems. The lack of permission checks suggests a design or implementation oversight in the access control logic of youlai-boot's role management. Organizations using this software should audit their deployments and apply fixes once available to prevent unauthorized role access.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized disclosure of privileged role information, undermining internal security controls and enabling attackers or malicious insiders to escalate privileges or gain unauthorized access to sensitive systems. This is particularly critical for sectors handling sensitive data such as finance, healthcare, and government, where role-based access controls are fundamental to regulatory compliance (e.g., GDPR). Exposure of root roles could facilitate further attacks, including data breaches or disruption of critical services. Since the vulnerability does not require authentication, it increases the attack surface and risk of exploitation from external threat actors. The confidentiality breach could also erode trust and lead to financial and reputational damage. Organizations relying on youlai-boot for identity and access management or internal role administration are at heightened risk.
Mitigation Recommendations
Immediate mitigation should focus on restricting network access to the SysRoleController endpoints, using firewalls or web application firewalls (WAFs) to limit exposure to trusted administrators only. Organizations should conduct thorough code reviews and implement strict permission checks in the getRoleForm function to ensure only authorized root users can access root roles. Until an official patch is released, consider deploying compensating controls such as enhanced logging and monitoring of role access requests to detect suspicious activity. Employ network segmentation to isolate critical systems using youlai-boot and enforce the principle of least privilege across all user accounts. Additionally, conduct security awareness training for administrators to recognize potential misuse of role access. Once a patch is available, prioritize its deployment in all affected environments. Regularly audit role assignments and access logs to identify and remediate unauthorized access attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-12-08T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6949bf39edc45005c15e34e5
Added to database: 12/22/2025, 9:59:21 PM
Last enriched: 12/22/2025, 10:12:12 PM
Last updated: 12/23/2025, 3:56:22 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-7316: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation Mitsubishi Electric CNC M800V Series M800VW
MediumCVE-2023-52163: n/a
HighCVE-2025-68480: CWE-405: Asymmetric Resource Consumption (Amplification) in marshmallow-code marshmallow
MediumCVE-2025-68476: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kedacore keda
HighCVE-2025-67436: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.