CVE-2025-14051
Published: 04 December 2025
Description
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Security Summary
CVE-2025-14051 is a vulnerability in youlaitech youlai-mall versions 1.0.0 and 2.0.0, affecting the functions getById, updateAddress, and deleteAddress within the file /mall-ums/app-api/v1/addresses/. The flaw stems from improper control of dynamically-identified variables, mapped to CWE-913 and CWE-914.
The vulnerability enables remote exploitation (AV:N) with low attack complexity (AC:L), requiring low privileges (PR:L) and no user interaction (UI:N). Successful attacks can result in low impacts to confidentiality, integrity, and availability (C:L/I:L/A:L), yielding a CVSS v3.1 base score of 6.3.
Advisories on VulDB and related GitHub issues document the issue, noting that an exploit has been published and is available for use. The vendor was contacted early regarding disclosure but provided no response, with no patches or official mitigations referenced.
Notable context includes the public availability of the exploit, which may facilitate real-world attacks against unpatched instances.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
IDOR in addresses API (/getById, /updateAddress, /deleteAddress) enables authenticated users to perform horizontal privilege escalation (T1068) by accessing/updating/deleting other users' PII without ownership checks, discover accounts via ID enumeration and exposed memberIds/names (T1087), collect data from the app repository (T1213), and manipulate stored data (T1565.001).