Home

Description

YOSHOP 2.0 allows unauthenticated information disclosure via comment-list API endpoints in the Goods module. The Comment model eagerly loads the related User model without field filtering; because User.php defines no $hidden or $visible attributes, sensitive fields (bcrypt password hash, mobile number, pay_money, expend_money.) are exposed in JSON responses. Route names vary per deployment (e.g. /api/goods.pinglun/list), but all call the same vulnerable model logic.

PUBLISHED Reserved 2025-08-16 | Published 2025-10-02 | Updated 2025-10-02 | Assigner mitre

References

gitee.com/xany/yoshop2.0

github.com/...9158e97c78fc4/2025/YOSHOP2.0/CVE-2025-56161.md

cve.org (CVE-2025-56161)

nvd.nist.gov (CVE-2025-56161)

Download JSON