Description
A vulnerability was determined in YunaiV yudao-cloud up to 2025.11. This affects the function BpmHttpCallbackTrigger/BpmSyncHttpRequestTrigger of the component Business Process Management. Executing manipulation of the argument url/header/body can lead to server-side request forgery. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
2025.1
2025.2
2025.3
2025.4
2025.5
2025.6
2025.7
2025.8
2025.9
2025.10
2025.11
Timeline
| 2025-12-25: | Advisory disclosed |
| 2025-12-25: | VulDB entry created |
| 2025-12-25: | VulDB entry last update |
Credits
Ana10gy (VulDB User)
References
vuldb.com/?id.338429 (VDB-338429 | YunaiV yudao-cloud Business Process Management BpmSyncHttpRequestTrigger server-side request forgery)
vuldb.com/?ctiid.338429 (VDB-338429 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.710170 (Submit #710170 | YunaiV YuDao Cloud <=v2025.11 Server-Side Request Forgery)
github.com/...b/main/archives/yudao-cloud-bpm_SSRF/report.md
github.com/...b/main/archives/yudao-cloud-bpm_SSRF/report.md
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.