CVE-2025-10277
📋 TL;DR
This vulnerability in YunaiV yudao-cloud allows remote attackers to bypass authorization controls by manipulating the ID parameter in the /crm/receivable/submit endpoint. It affects all systems running yudao-cloud up to version 2025.09. The exploit is publicly available, increasing the risk of exploitation.
💻 Affected Systems
- YunaiV yudao-cloud
📦 What is this software?
Yudao Cloud by Iocoder
⚠️ Risk & Real-World Impact
Worst Case
Attackers could gain unauthorized access to sensitive CRM data, modify financial records, or perform unauthorized actions within the CRM module.
Likely Case
Unauthorized access to CRM receivable data, potentially exposing customer financial information or allowing manipulation of payment records.
If Mitigated
With proper network segmentation and access controls, impact would be limited to the CRM module only.
🎯 Exploit Status
Exploit involves manipulating ID parameter in HTTP requests to /crm/receivable/submit endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
Upgrade to version after 2025.09 when available. Monitor YunaiV repositories for security updates.
🔧 Temporary Workarounds
Block vulnerable endpoint
allTemporarily block access to the vulnerable /crm/receivable/submit endpoint using WAF or network controls
Implement additional authorization checks
allAdd server-side authorization validation for ID parameter in CRM module
🧯 If You Can't Patch
- Implement strict network segmentation to isolate yudao-cloud instances
- Deploy WAF with custom rules to detect and block exploitation attempts
🔍 How to Verify
Check if Vulnerable:
Check if system is running yudao-cloud version 2025.09 or earlier and has /crm/receivable/submit endpoint accessible
Check Version:
Check application version in yudao-cloud configuration or package manager
Verify Fix Applied:
Verify version is newer than 2025.09 and test authorization controls on the vulnerable endpoint
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authorization attempts on /crm/receivable/submit
- Unusual ID parameter patterns in CRM requests
Network Indicators:
- HTTP requests to /crm/receivable/submit with manipulated ID parameters
- Unusual traffic patterns to CRM endpoints
SIEM Query:
source="yudao-cloud" AND (uri="/crm/receivable/submit" AND status=200) AND user_agent NOT IN ["expected_user_agents"]