Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qw2g-qp82-qw5p

Опубликовано: 26 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 6.3

Описание

A vulnerability was determined in YunaiV yudao-cloud up to 2025.09. Affected by this issue is some unknown functionality of the file /crm/contact/transfer of the component HTTP Request Handler. This manipulation of the argument contactId causes improper authorization. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability was determined in YunaiV yudao-cloud up to 2025.09. Affected by this issue is some unknown functionality of the file /crm/contact/transfer of the component HTTP Request Handler. This manipulation of the argument contactId causes improper authorization. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 20%
0.00064
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-266

Связанные уязвимости

CVSS3: 6.3
nvd
5 месяцев назад

A vulnerability was determined in YunaiV yudao-cloud up to 2025.09. Affected by this issue is some unknown functionality of the file /crm/contact/transfer of the component HTTP Request Handler. This manipulation of the argument contactId causes improper authorization. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 20%
0.00064
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-266