CVE-2025-0331

5.3 MEDIUM

📋 TL;DR

This vulnerability in YunzMall allows attackers to remotely bypass password recovery mechanisms through weak password reset functionality. Attackers can exploit this to gain unauthorized access to user accounts. All YunzMall installations up to version 2.4.2 are affected.

💻 Affected Systems

Products:
  • YunzMall
Versions: up to 2.4.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable ResetpwdController.php component are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the YunzMall platform, leading to complete system compromise, data theft, and potential ransomware deployment.

🟠

Likely Case

Attackers compromise user accounts to steal personal information, payment details, and conduct fraudulent transactions.

🟢

If Mitigated

With proper monitoring and access controls, impact is limited to isolated account compromises that can be quickly detected and remediated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available and require minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to any version beyond 2.4.2 if available, or implement workarounds.

🔧 Temporary Workarounds

Disable Password Reset Function

all

Temporarily disable the vulnerable password reset endpoint to prevent exploitation

# Modify /app/platform/controllers/ResetpwdController.php to comment out or remove changePwd function

Implement Rate Limiting

all

Add rate limiting to password reset requests to make brute-force attacks impractical

# Configure web server or application firewall to limit POST requests to /resetpwd endpoints

🧯 If You Can't Patch

  • Implement network segmentation to isolate YunzMall from critical systems
  • Enable detailed logging and monitoring of all password reset attempts

🔍 How to Verify

Check if Vulnerable:

Check if YunzMall version is 2.4.2 or earlier and if /app/platform/controllers/ResetpwdController.php exists with changePwd function

Check Version:

# Check YunzMall version in configuration files or admin panel

Verify Fix Applied:

Verify that password reset functionality requires proper authentication and validation, or that the vulnerable endpoint is disabled

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed password reset attempts from single IP
  • Unusual patterns in password reset logs
  • Successful password resets without proper verification

Network Indicators:

  • Unusual volume of POST requests to /resetpwd endpoints
  • Requests bypassing normal authentication flows

SIEM Query:

source="web_logs" AND (uri_path="/resetpwd" OR uri_path="/changePwd") AND status=200 AND user_agent NOT IN ["normal_user_agents"]

🔗 References

📤 Share & Export