CVE-2025-13117
📋 TL;DR
This vulnerability allows attackers to cancel orders without proper authorization in macrozheng mall-swarm and mall applications. Attackers can exploit this remotely by manipulating the orderId parameter in the cancelOrder function. All users running affected versions are vulnerable to unauthorized order cancellations.
💻 Affected Systems
- macrozheng mall-swarm
- macrozheng mall
📦 What is this software?
Mall by Macrozheng
Mall Swarm by Macrozheng
⚠️ Risk & Real-World Impact
Worst Case
Mass unauthorized order cancellations leading to financial loss, customer dissatisfaction, and potential business disruption.
Likely Case
Targeted unauthorized order cancellations affecting specific customers or orders, causing customer service issues and potential refund processing problems.
If Mitigated
Minimal impact with proper authentication and authorization controls in place, limited to attempted attacks that are logged and blocked.
🎯 Exploit Status
Exploit has been publicly disclosed and requires authentication but bypasses authorization checks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available - vendor did not respond to disclosure
Restart Required: Yes
Instructions:
No official patch available. Consider upgrading to a newer version if available, or implement workarounds.
🔧 Temporary Workarounds
Implement Authorization Check
allAdd proper authorization validation in the cancelOrder function to verify user has permission to cancel specific orders
Modify source code to add user permission checks before processing order cancellation
Web Application Firewall Rule
allBlock suspicious order cancellation requests or implement rate limiting
Configure WAF to monitor and block unusual patterns in /order/cancelOrder requests
🧯 If You Can't Patch
- Implement network segmentation to restrict access to the vulnerable endpoint
- Enable detailed logging and monitoring for all order cancellation attempts
🔍 How to Verify
Check if Vulnerable:
Test if unauthorized users can cancel orders by manipulating orderId parameter in /order/cancelOrder endpoint
Check Version:
Check application version in pom.xml or application.properties files
Verify Fix Applied:
Verify that proper authorization checks are in place and only authorized users can cancel their own orders
📡 Detection & Monitoring
Log Indicators:
- Multiple failed authorization attempts on /order/cancelOrder
- Order cancellations from unusual IP addresses or user accounts
- Rapid sequence of order cancellation requests
Network Indicators:
- Unusual patterns of POST requests to /order/cancelOrder endpoint
- Order cancellation requests with manipulated orderId parameters
SIEM Query:
source="application.logs" AND (uri="/order/cancelOrder" AND (response_code=200 OR response_code=403) AND user_id!=order_owner_id)