Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66735: n/a

0
High
VulnerabilityCVE-2025-66735cvecve-2025-66735
Published: Mon Dec 22 2025 (12/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

youlai-boot V2.21.1 is vulnerable to Incorrect Access Control. The getRoleForm function in SysRoleController.java does not perform permission checks, which may allow non-root users to directly access root roles.

AI-Powered Analysis

AILast updated: 12/22/2025, 22:12:12 UTC

Technical Analysis

CVE-2025-66735 identifies an incorrect access control vulnerability in youlai-boot version 2.21.1, specifically within the getRoleForm function of the SysRoleController.java component. The vulnerability arises because this function fails to perform necessary permission checks before granting access to role information. As a result, non-root users can directly access root roles, which should normally be restricted. This flaw corresponds to CWE-284 (Improper Access Control) and CWE-862 (Missing Authorization). The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact primarily affects confidentiality by exposing sensitive role data, but does not affect integrity or availability. No patches or exploit code are currently available, and no known exploits have been observed in the wild. However, the vulnerability poses a significant risk because unauthorized access to root roles can facilitate privilege escalation or lateral movement within affected systems. The lack of permission checks suggests a design or implementation oversight in the access control logic of youlai-boot's role management. Organizations using this software should audit their deployments and apply fixes once available to prevent unauthorized role access.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of privileged role information, undermining internal security controls and enabling attackers or malicious insiders to escalate privileges or gain unauthorized access to sensitive systems. This is particularly critical for sectors handling sensitive data such as finance, healthcare, and government, where role-based access controls are fundamental to regulatory compliance (e.g., GDPR). Exposure of root roles could facilitate further attacks, including data breaches or disruption of critical services. Since the vulnerability does not require authentication, it increases the attack surface and risk of exploitation from external threat actors. The confidentiality breach could also erode trust and lead to financial and reputational damage. Organizations relying on youlai-boot for identity and access management or internal role administration are at heightened risk.

Mitigation Recommendations

Immediate mitigation should focus on restricting network access to the SysRoleController endpoints, using firewalls or web application firewalls (WAFs) to limit exposure to trusted administrators only. Organizations should conduct thorough code reviews and implement strict permission checks in the getRoleForm function to ensure only authorized root users can access root roles. Until an official patch is released, consider deploying compensating controls such as enhanced logging and monitoring of role access requests to detect suspicious activity. Employ network segmentation to isolate critical systems using youlai-boot and enforce the principle of least privilege across all user accounts. Additionally, conduct security awareness training for administrators to recognize potential misuse of role access. Once a patch is available, prioritize its deployment in all affected environments. Regularly audit role assignments and access logs to identify and remediate unauthorized access attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6949bf39edc45005c15e34e5

Added to database: 12/22/2025, 9:59:21 PM

Last enriched: 12/22/2025, 10:12:12 PM

Last updated: 12/23/2025, 3:56:22 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats