Improper Authentication Flaw in YunaiV yudao-cloud by Ruoyi-Vue-Pro
CVE-2026-7710

6.9MEDIUM

Key Information:

Vendor

Yunaiv

Vendor
CVE Published:
3 May 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-7710?

A security flaw exists in the YunaiV yudao-cloud up to version 3.8.0, specifically within the doFilterInternal function of JwtAuthenticationTokenFilter.java related to the Ruoyi-Vue-Pro component. This vulnerability allows attackers to manipulate the argument mock-token, resulting in improper authentication processes. The potential for remote exploitation poses significant risks, as the exploit has been publicly available. Despite early notification, the vendor has not provided a response regarding this issue, heightening concerns for users and administrators reliant on this product.

Affected Version(s)

yudao-cloud 3.0

yudao-cloud 3.1

yudao-cloud 3.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

9str0il (VulDB User)
VulDB CNA Team
.