CVE-2025-10674
📋 TL;DR
CVE-2025-10674 is an improper authorization vulnerability in the fuyang_lipengjun platform 1.0 that allows attackers to access the /attributecategory/queryAll endpoint without proper permissions. This affects all users running version 1.0 of the platform and can be exploited remotely.
💻 Affected Systems
- fuyang_lipengjun platform
📦 What is this software?
Platform by Fuyang Lipengjun
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive attribute category data, potentially leading to information disclosure or unauthorized data manipulation.
Likely Case
Unauthorized access to attribute category information, potentially exposing internal data structures or configuration details.
If Mitigated
Limited impact with proper network segmentation and access controls in place.
🎯 Exploit Status
The exploit is publicly available and described in blog posts, making exploitation straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available or implementing workarounds.
🔧 Temporary Workarounds
Implement Access Control
allAdd proper authorization checks to the AttributeCategoryController and /attributecategory/queryAll endpoint
Implement role-based access control (RBAC) or similar authorization mechanism
Network Segmentation
allRestrict network access to the vulnerable endpoint
Configure firewall rules to limit access to /attributecategory/queryAll endpoint
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block unauthorized access to the vulnerable endpoint
- Monitor access logs for suspicious activity targeting /attributecategory/queryAll
🔍 How to Verify
Check if Vulnerable:
Check if running fuyang_lipengjun platform version 1.0 and test if /attributecategory/queryAll endpoint is accessible without proper authorization
Check Version:
Check application configuration files or documentation for version information
Verify Fix Applied:
Test that /attributecategory/queryAll endpoint now requires proper authentication and authorization
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to /attributecategory/queryAll
- Multiple failed authorization attempts
Network Indicators:
- Unusual traffic patterns to /attributecategory/queryAll endpoint
- Requests bypassing authentication
SIEM Query:
source_ip=* AND uri_path="/attributecategory/queryAll" AND (auth_status="failed" OR auth_status="none")