CVE-2025-15098

6.3 MEDIUM

📋 TL;DR

This CVE describes a server-side request forgery (SSRF) vulnerability in YunaiV yudao-cloud's Business Process Management component. Attackers can manipulate URL, header, or body parameters in BpmHttpCallbackTrigger/BpmSyncHttpRequestTrigger functions to make the server send unauthorized requests to internal systems. Organizations using yudao-cloud up to version 2025.11 are affected.

💻 Affected Systems

Products:
  • YunaiV yudao-cloud
Versions: Up to 2025.11
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Business Process Management component specifically. Requires the vulnerable functions to be exposed/accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or pivot to attack other internal systems by abusing the vulnerable server's network position.

🟠

Likely Case

Information disclosure from internal services, potential data exfiltration, or reconnaissance of internal network infrastructure.

🟢

If Mitigated

Limited impact if network segmentation restricts vulnerable server's access to sensitive internal resources.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires access to trigger the vulnerable BPM functions. Public proof-of-concept exists in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None provided

Restart Required: No

Instructions:

No official patch available. Consider upgrading to versions after 2025.11 if available, or implement workarounds.

🔧 Temporary Workarounds

Input Validation and URL Whitelisting

all

Implement strict validation of URL parameters to only allow trusted domains and protocols. Reject URLs pointing to internal IP ranges.

Network Segmentation

all

Restrict outbound network access from the vulnerable server to only necessary external services using firewall rules.

🧯 If You Can't Patch

  • Disable or restrict access to BpmHttpCallbackTrigger and BpmSyncHttpRequestTrigger functions if not required
  • Implement web application firewall (WAF) rules to detect and block SSRF patterns in requests

🔍 How to Verify

Check if Vulnerable:

Check if yudao-cloud version is 2025.11 or earlier and if BPM component with vulnerable functions is enabled. Test with controlled SSRF payloads to internal services.

Check Version:

Check application configuration or deployment manifests for yudao-cloud version information

Verify Fix Applied:

Test that URL/header/body manipulation no longer results in unauthorized outbound requests to internal or restricted addresses.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from server to internal IP addresses
  • Requests to BPM functions with suspicious URL parameters

Network Indicators:

  • Outbound connections from application server to unexpected internal services
  • HTTP requests to internal IP ranges from application

SIEM Query:

source="yudao-cloud" AND (url CONTAINS "internal" OR url CONTAINS "localhost" OR url CONTAINS "127.0.0.1" OR url CONTAINS "192.168." OR url CONTAINS "10." OR url CONTAINS "172.16.")

🔗 References

📤 Share & Export