Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70058: n/a

0
Unknown
VulnerabilityCVE-2025-70058cvecve-2025-70058
Published: Mon Feb 23 2026 (02/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue pertaining to CWE-295: Improper Certificate Validation was discovered in YMFE yapi v1.12.0. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in the HTTPS agent configuration for Axios requests

AI-Powered Analysis

AILast updated: 02/23/2026, 16:17:05 UTC

Technical Analysis

CVE-2025-70058 identifies a critical security vulnerability in YMFE yapi version 1.12.0 related to improper certificate validation (CWE-295). The root cause is the explicit disabling of TLS/SSL certificate verification by setting the 'rejectUnauthorized' flag to false within the HTTPS agent configuration used by Axios HTTP client requests. This misconfiguration effectively bypasses the security guarantees provided by HTTPS, allowing attackers positioned on the network path to intercept, modify, or spoof communications between the client and server without detection. Since TLS/SSL certificates are not validated, attackers can present fraudulent certificates, enabling man-in-the-middle (MITM) attacks that compromise confidentiality and integrity of data in transit. The vulnerability does not require user authentication or complex exploitation techniques, only the ability to intercept network traffic. Although no public exploits have been reported yet, the flaw is straightforward to exploit in environments where network interception is feasible, such as public Wi-Fi or compromised internal networks. The lack of a CVSS score suggests this is a newly published vulnerability, but the technical details indicate a high-risk issue. The vulnerability affects all deployments of YMFE yapi v1.12.0 that use Axios with this insecure configuration. Without proper certificate validation, sensitive information such as API tokens, credentials, or personal data can be exposed or manipulated by attackers.

Potential Impact

The primary impact of CVE-2025-70058 is the compromise of confidentiality and integrity of data transmitted via HTTPS in affected YMFE yapi applications. Attackers can perform man-in-the-middle attacks to eavesdrop on sensitive information, inject malicious payloads, or hijack sessions. This can lead to data breaches, unauthorized access, and further exploitation of internal systems. Organizations relying on YMFE yapi for API management or development may face significant risks, especially if sensitive or regulated data is transmitted. The vulnerability can undermine trust in secure communications and may facilitate lateral movement within corporate networks if exploited. Given the widespread use of Axios and the popularity of YMFE yapi in certain developer communities, the scope of affected systems could be broad. The absence of authentication requirements and the ease of exploitation increase the threat level. Although no known exploits exist in the wild, the vulnerability presents a clear attack vector for adversaries with network access.

Mitigation Recommendations

To mitigate CVE-2025-70058, organizations should immediately audit their YMFE yapi deployments and Axios HTTP client configurations to ensure 'rejectUnauthorized' is set to true or omitted to enforce default certificate validation. Developers must avoid disabling TLS/SSL verification in production environments. Applying patches or updates from YMFE yapi vendors that address this issue is critical once available. Network-level protections such as enforcing HTTPS with strict transport security (HSTS) and using network segmentation can reduce exposure. Employing certificate pinning where feasible can further protect against MITM attacks. Regular security code reviews and automated scanning for insecure TLS configurations in development pipelines are recommended. Additionally, educating developers about the risks of disabling certificate validation and establishing secure coding guidelines can prevent recurrence. Monitoring network traffic for suspicious MITM activity and using endpoint detection tools can help identify exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699c7b9bbe58cf853ba5282b

Added to database: 2/23/2026, 4:08:59 PM

Last enriched: 2/23/2026, 4:17:05 PM

Last updated: 2/24/2026, 5:22:33 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats