Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 26 Dec 2025 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in YunaiV yudao-cloud up to 2025.11. This affects the function BpmHttpCallbackTrigger/BpmSyncHttpRequestTrigger of the component Business Process Management. Executing manipulation of the argument url/header/body can lead to server-side request forgery. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | YunaiV yudao-cloud Business Process Management BpmSyncHttpRequestTrigger server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-26T03:02:06.492Z
Reserved: 2025-12-25T16:08:17.380Z
Link: CVE-2025-15098
No data.
Status : Received
Published: 2025-12-26T03:15:50.460
Modified: 2025-12-26T03:15:50.460
Link: CVE-2025-15098
No data.
OpenCVE Enrichment
No data.