Improper Authentication Flaw in YunaiV yudao-cloud by Ruoyi-Vue-Pro
CVE-2026-7710
Key Information:
- Vendor
Yunaiv
- Status
- Vendor
- CVE Published:
- 3 May 2026
Badges
What is CVE-2026-7710?
A security flaw exists in the YunaiV yudao-cloud up to version 3.8.0, specifically within the doFilterInternal function of JwtAuthenticationTokenFilter.java related to the Ruoyi-Vue-Pro component. This vulnerability allows attackers to manipulate the argument mock-token, resulting in improper authentication processes. The potential for remote exploitation poses significant risks, as the exploit has been publicly available. Despite early notification, the vendor has not provided a response regarding this issue, heightening concerns for users and administrators reliant on this product.
Affected Version(s)
yudao-cloud 3.0
yudao-cloud 3.1
yudao-cloud 3.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
