CVE-2025-10987

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to bypass authorization controls in YunaiV yudao-cloud by manipulating the contactId parameter in the /crm/contact/transfer endpoint. Attackers can potentially transfer CRM contacts without proper permissions. Affected systems include YunaiV yudao-cloud installations up to version 2025.09.

💻 Affected Systems

Products:
  • YunaiV yudao-cloud
Versions: up to 2025.09
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the HTTP Request Handler component. Requires the /crm/contact/transfer endpoint to be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could transfer sensitive CRM contact data to malicious actors, leading to data theft, business disruption, or compliance violations.

🟠

Likely Case

Attackers with some system access could escalate privileges and manipulate CRM data they shouldn't have access to.

🟢

If Mitigated

With proper network segmentation and authentication controls, impact would be limited to authorized users only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit has been publicly disclosed. Attack requires some level of access to the system but not proper authorization for the specific function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor was contacted but did not respond. Consider upgrading to versions after 2025.09 if available.

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Restrict access to the /crm/contact/transfer endpoint using web application firewall or network controls

Implement additional authorization checks

all

Add server-side authorization validation for contact transfer operations

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable system
  • Deploy web application firewall with custom rules to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if yudao-cloud version is 2025.09 or earlier and the /crm/contact/transfer endpoint is accessible

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Test if unauthorized users can successfully transfer contacts via the vulnerable endpoint

📡 Detection & Monitoring

Log Indicators:

  • Unusual contact transfer activities
  • Failed authorization attempts on /crm/contact/transfer
  • Multiple transfer requests from single user

Network Indicators:

  • HTTP POST requests to /crm/contact/transfer with manipulated contactId parameters

SIEM Query:

source="web_server" AND (url="/crm/contact/transfer" AND method="POST") AND (user_role!="admin" OR auth_result="failed")

🔗 References

📤 Share & Export