Impact
The flaw lies in the OAuth2TokenServiceImpl component of YunaiV yudao-cloud, where the getAccessToken method neglects to verify authentication properly before issuing tokens. An attacker can craft requests that satisfy the method's pre‑conditions yet sidestep all access controls, resulting in the issuance of access tokens that grant the attacker unauthorized access to protected system resources.
Affected Systems
All instances of YunaiV yudao-cloud running any version up to and including 2026.01 are affected. The vulnerability is confined to the yudao-module-system-biz module, specifically the OAuth2TokenServiceImpl.java file.
Risk and Exploitability
The CVSS score of 6.9 signifies a moderate severity vulnerability. EPSS data is not available and the issue is not listed in CISA's KEV catalog, but the description notes that the exploitation code is publicly available and can be triggered remotely. The lack of vendor response further heightens the risk until a definitive fix is released.
OpenCVE Enrichment