A vulnerability has been found in macrozheng mall up to 1.0.3. This affects the function cancelOrder of the file /order/cancelUserOrder. The manipulation of the argument orderId leads to authorization bypass. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://github.com/ez-lbz/poc/issues/46 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/ez-lbz/poc/issues/46#issue-3354477952 | Exploit Issue Tracking Third Party Advisory |
| https://vuldb.com/?ctiid.322182 | Permissions Required VDB Entry |
| https://vuldb.com/?id.322182 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.641729 | Third Party Advisory VDB Entry |
| https://github.com/ez-lbz/poc/issues/46 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/ez-lbz/poc/issues/46#issue-3354477952 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-09-02 22:15
Updated : 2025-09-05 17:44
NVD link : CVE-2025-9835
Mitre link : CVE-2025-9835
CVE.ORG link : CVE-2025-9835
JSON object : View
Products Affected
macrozheng
- mall
