Skip to main content

CVE-2025-8755: Authorization Bypass in macrozheng mall

Medium
VulnerabilityCVE-2025-8755cvecve-2025-8755
Published: Sat Aug 09 2025 (08/09/2025, 14:02:05 UTC)
Source: CVE Database V5
Vendor/Project: macrozheng
Product: mall

Description

A vulnerability was found in macrozheng mall up to 1.0.3 and classified as problematic. This issue affects the function detail of the file UmsMemberController.java of the component com.macro.mall.portal.controller. The manipulation of the argument orderId leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/10/2025, 00:34:32 UTC

Technical Analysis

CVE-2025-8755 is an authorization bypass vulnerability identified in the macrozheng mall software, versions up to 1.0.3. The vulnerability resides in the UmsMemberController.java file, specifically within the 'detail' function of the com.macro.mall.portal.controller component. The flaw arises due to improper validation or handling of the 'orderId' argument, which an attacker can manipulate to bypass authorization controls. This means an unauthenticated remote attacker can potentially access or manipulate order details that should be restricted, without needing any privileges or user interaction. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impact on confidentiality (VC:L) with no impact on integrity or availability. The vendor has been contacted but has not responded or provided a patch, and no known exploits are currently observed in the wild. The vulnerability is publicly disclosed, which increases the risk of exploitation attempts. The root cause is likely insufficient authorization checks on the orderId parameter, allowing attackers to access or manipulate order information of other users or orders without proper permissions.

Potential Impact

For European organizations using macrozheng mall software, this vulnerability can lead to unauthorized access to sensitive order information, potentially exposing customer data such as purchase details, personal information, or payment status. This could result in privacy violations under GDPR regulations, leading to legal and financial consequences. Additionally, attackers could manipulate order data, causing financial discrepancies, fraud, or reputational damage. Since the vulnerability does not require authentication or user interaction and can be exploited remotely, it poses a significant risk to e-commerce platforms relying on this software. The lack of vendor response and patch availability increases the exposure window, making European businesses more vulnerable to targeted attacks or opportunistic exploitation. The partial confidentiality impact means sensitive data leakage is the primary concern, but the integrity and availability of the system remain unaffected according to current analysis.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. These include: 1) Implement strict input validation and authorization checks on the 'orderId' parameter at the application or web server level to ensure users can only access their own orders. 2) Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious manipulation of orderId parameters. 3) Conduct thorough access control audits and code reviews to identify and remediate similar authorization flaws. 4) Monitor logs for unusual access patterns or repeated attempts to access unauthorized order details. 5) If feasible, isolate or restrict access to the affected component until a vendor patch is available. 6) Engage with the vendor or community to encourage patch development and share threat intelligence. 7) Educate staff and customers about potential phishing or social engineering attempts that might leverage this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-08T15:20:18.954Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6897e8eaad5a09ad000f48ed

Added to database: 8/10/2025, 12:33:46 AM

Last enriched: 8/10/2025, 12:34:32 AM

Last updated: 8/10/2025, 8:24:22 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats