Description
A security flaw has been discovered in YunaiV yudao-cloud up to 3.8.0. This affects the function doFilterInternal of the file JwtAuthenticationTokenFilter.java of the component Ruoyi-Vue-Pro. Performing a manipulation of the argument mock-token results in improper authentication. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8.0
Timeline
| 2026-05-03: | Advisory disclosed |
| 2026-05-03: | VulDB entry created |
| 2026-05-03: | VulDB entry last update |
Credits
9str0il (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/360886 (VDB-360886 | YunaiV yudao-cloud Ruoyi-Vue-Pro JwtAuthenticationTokenFilter.java doFilterInternal improper authentication)
vuldb.com/vuln/360886/cti (VDB-360886 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/806493 (Submit #806493 | YunaiV yudao-cloud yudao-cloud up to 2026.01 Authentication Bypass by Primary Weakness)
github.com/9str0IL/CVE/issues/5