Impact
The flaw in the YunaiV yudao-cloud component Ruoyi-Vue-Pro arises from the doFilterInternal method in JwtAuthenticationTokenFilter.java, where a crafted mock-token value can be passed as an argument. By manipulating this parameter, an attacker can bypass authentication controls and gain the privileges of a legitimate user. This represents the classic CWE-287 vulnerability, where the system fails to properly authenticate credentials, leading to unauthorized access without direct exploitation of other system components.
Affected Systems
Versioned binaries of YunaiV yudao-cloud up to and including 3.8.0 are affected. The weakness specifically targets the code path inside JwtAuthenticationTokenFilter.java of the Ruoyi-Vue-Pro framework, implying that any deployment of this library within that version range is at risk.
Risk and Exploitability
The CVSS score of 6.9 classifies the defect as a moderate severity issue, though the public availability of a working exploit raises immediate concern. With no EPSS score available and the vulnerability not listed in CISA’s KEV catalog, the estimated exploitation probability remains uncertain, yet the remote nature of the attack vector and related authentication bypass allow an adversary to impersonate users over the network. The likely attack path involves sending a crafted HTTP request containing a manipulated mock-token parameter to the authentication endpoint, which then accepts the request and authenticates the attacker.
OpenCVE Enrichment