Cyber Posture

CVE-2026-7710

High

Published: 04 May 2026

Published
04 May 2026
Modified
04 May 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 18.9th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

A security flaw has been discovered in YunaiV yudao-cloud up to 3.8.0. This affects the function doFilterInternal of the file JwtAuthenticationTokenFilter.java of the component Ruoyi-Vue-Pro. Performing a manipulation of the argument mock-token results in improper authentication. Remote exploitation of the…

more

attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 requires the system to enforce approved authorizations for access, directly addressing the failure of the JwtAuthenticationTokenFilter to prevent authentication bypass via mock-token manipulation.

prevent

IA-2 mandates unique identification and authentication of users, countering the improper authentication vulnerability that allows unauthenticated remote attackers to bypass JWT mechanisms.

prevent

SI-10 requires validation and sanitization of information inputs, mitigating manipulation of the mock-token argument that leads to authentication bypass in the filter.

Security SummaryAI

CVE-2026-7710 is an improper authentication vulnerability (CWE-287) in YunaiV yudao-cloud versions up to 3.8.0. It affects the doFilterInternal function in the JwtAuthenticationTokenFilter.java file within the Ruoyi-Vue-Pro component. The flaw arises from manipulation of the mock-token argument, enabling attackers to bypass authentication mechanisms.

The vulnerability is remotely exploitable over the network with low attack complexity and no required privileges or user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, score 7.3). Any unauthenticated remote attacker can perform the manipulation to achieve improper authentication, resulting in low-level impacts to confidentiality, integrity, and availability.

Advisories from VulDB and a GitHub issue note that the exploit has been publicly released and may be used in attacks. The vendor was contacted early about the disclosure but did not respond, and no patches or specific mitigations are detailed in the available references.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes a remote, unauthenticated authentication bypass in a public-facing Java web application (Jwt filter in yudao-cloud), which directly matches the definition of exploiting a weakness in an Internet-facing application to gain initial access.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References