CVE-2026-7710
Published: 04 May 2026
Description
A security flaw has been discovered in YunaiV yudao-cloud up to 3.8.0. This affects the function doFilterInternal of the file JwtAuthenticationTokenFilter.java of the component Ruoyi-Vue-Pro. Performing a manipulation of the argument mock-token results in improper authentication. Remote exploitation of the…
more
attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Mitigating Controls (NIST 800-53 r5)AI
AC-3 requires the system to enforce approved authorizations for access, directly addressing the failure of the JwtAuthenticationTokenFilter to prevent authentication bypass via mock-token manipulation.
IA-2 mandates unique identification and authentication of users, countering the improper authentication vulnerability that allows unauthenticated remote attackers to bypass JWT mechanisms.
SI-10 requires validation and sanitization of information inputs, mitigating manipulation of the mock-token argument that leads to authentication bypass in the filter.
Security SummaryAI
CVE-2026-7710 is an improper authentication vulnerability (CWE-287) in YunaiV yudao-cloud versions up to 3.8.0. It affects the doFilterInternal function in the JwtAuthenticationTokenFilter.java file within the Ruoyi-Vue-Pro component. The flaw arises from manipulation of the mock-token argument, enabling attackers to bypass authentication mechanisms.
The vulnerability is remotely exploitable over the network with low attack complexity and no required privileges or user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, score 7.3). Any unauthenticated remote attacker can perform the manipulation to achieve improper authentication, resulting in low-level impacts to confidentiality, integrity, and availability.
Advisories from VulDB and a GitHub issue note that the exploit has been publicly released and may be used in attacks. The vendor was contacted early about the disclosure but did not respond, and no patches or specific mitigations are detailed in the available references.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a remote, unauthenticated authentication bypass in a public-facing Java web application (Jwt filter in yudao-cloud), which directly matches the definition of exploiting a weakness in an Internet-facing application to gain initial access.