Skip to main content

CVE-2025-8755: Authorization Bypass in macrozheng mall

Medium
VulnerabilityCVE-2025-8755cvecve-2025-8755
Published: Sat Aug 09 2025 (08/09/2025, 14:02:05 UTC)
Source: CVE Database V5
Vendor/Project: macrozheng
Product: mall

Description

A vulnerability was found in macrozheng mall up to 1.0.3 and classified as problematic. This issue affects the function detail of the file UmsMemberController.java of the component com.macro.mall.portal.controller. The manipulation of the argument orderId leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/17/2025, 00:58:15 UTC

Technical Analysis

CVE-2025-8755 is an authorization bypass vulnerability identified in the macrozheng mall application, specifically affecting versions 1.0.0 through 1.0.3. The vulnerability resides in the UmsMemberController.java file within the com.macro.mall.portal.controller component. The flaw is triggered by manipulating the 'orderId' argument in the 'detail' function, which allows an attacker to bypass authorization controls. This means an unauthenticated remote attacker can potentially access or manipulate order details without proper permissions. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The vector string (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) shows that the attack can be performed remotely over the network without any authentication or user interaction, with low attack complexity. The impact is limited to confidentiality (VC:L) with no integrity or availability impact. The vendor was contacted but did not respond, and no patches or mitigations have been published yet. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation.

Potential Impact

For European organizations using macrozheng mall versions up to 1.0.3, this vulnerability poses a significant risk to the confidentiality of order-related data. Attackers could remotely access sensitive order information without authentication, potentially leading to data leakage of customer details, order history, or transaction data. This could result in reputational damage, loss of customer trust, and regulatory non-compliance under GDPR due to unauthorized data exposure. Since the vulnerability does not affect integrity or availability, direct disruption of services or data manipulation is less likely. However, the unauthorized data access alone can have serious privacy and compliance implications. Organizations relying on this software for e-commerce or order management should consider the risk of targeted attacks, especially given the public availability of exploit details.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should implement immediate compensating controls. These include restricting network access to the macrozheng mall application to trusted internal IP ranges or VPN-only access to reduce exposure. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious requests manipulating the 'orderId' parameter. Conduct thorough logging and monitoring of access to order detail endpoints to detect anomalous access patterns. If possible, perform code review and apply custom authorization checks on the 'detail' function to validate user permissions against the requested orderId before returning data. Organizations should also engage with the vendor for patch timelines or consider upgrading to a fixed version once available. Additionally, sensitive data encryption at rest and in transit should be ensured to minimize data exposure risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-08T15:20:18.954Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6897e8eaad5a09ad000f48ed

Added to database: 8/10/2025, 12:33:46 AM

Last enriched: 8/17/2025, 12:58:15 AM

Last updated: 9/23/2025, 9:16:43 PM

Views: 51

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats