Home

Description

A vulnerability was determined in YunaiV yudao-cloud up to 2025.11. This affects the function BpmHttpCallbackTrigger/BpmSyncHttpRequestTrigger of the component Business Process Management. Executing manipulation of the argument url/header/body can lead to server-side request forgery. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2025-12-25 | Published 2025-12-26 | Updated 2025-12-26 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Server-Side Request Forgery

Product status

2025.0
affected

2025.1
affected

2025.2
affected

2025.3
affected

2025.4
affected

2025.5
affected

2025.6
affected

2025.7
affected

2025.8
affected

2025.9
affected

2025.10
affected

2025.11
affected

Timeline

2025-12-25:Advisory disclosed
2025-12-25:VulDB entry created
2025-12-25:VulDB entry last update

Credits

Ana10gy (VulDB User) reporter

References

vuldb.com/?id.338429 (VDB-338429 | YunaiV yudao-cloud Business Process Management BpmSyncHttpRequestTrigger server-side request forgery) vdb-entry technical-description

vuldb.com/?ctiid.338429 (VDB-338429 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.710170 (Submit #710170 | YunaiV YuDao Cloud <=v2025.11 Server-Side Request Forgery) third-party-advisory

github.com/...b/main/archives/yudao-cloud-bpm_SSRF/report.md related

github.com/...b/main/archives/yudao-cloud-bpm_SSRF/report.md exploit

cve.org (CVE-2025-15098)

nvd.nist.gov (CVE-2025-15098)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.