YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)
YunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.
CVE-2026-7710 is an authentication bypass vulnerability affecting YunaiV’s yudao-cloud, specifically versions up to 3.8.0. The vulnerability resides in the doFilterInternal function within the JwtAuthenticationTokenFilter.java file of the Ruoyi-Vue-Pro component. An attacker can exploit this vulnerability by manipulating the mock-token argument, leading to improper authentication. This allows a remote attacker to potentially gain unauthorized access to the application. Public exploits are available, increasing the risk of exploitation. The vendor was notified but has not responded.
Attack Chain
- Attacker identifies a YunaiV yudao-cloud instance running a vulnerable version (<= 3.8.0).
- Attacker crafts a malicious HTTP request targeting an endpoint protected by authentication.
- The crafted request includes a manipulated
mock-tokenargument designed to bypass the JWT authentication filter. - The
JwtAuthenticationTokenFilter.javacomponent processes the request and improperly validates the manipulatedmock-token. - Due to the flawed authentication logic, the attacker is granted unauthorized access as an authenticated user.
- Attacker gains access to protected resources and functionalities within the application.
- Attacker performs privileged actions such as data modification, account takeover, or further exploitation of the system.
Impact
Successful exploitation of CVE-2026-7710 allows attackers to bypass authentication and gain unauthorized access to YunaiV yudao-cloud applications. This can lead to the compromise of sensitive data, modification of application settings, and potentially full system takeover. Given the availability of public exploits, organizations using affected versions of yudao-cloud are at high risk. The CVSS v3.1 base score for this vulnerability is 7.3, indicating a high severity level.
Recommendation
- Upgrade YunaiV yudao-cloud to a patched version that addresses CVE-2026-7710.
- Deploy the Sigma rule
Detect Malicious Mock Token Argumentto identify exploitation attempts by monitoring web server logs for the presence of amock-tokenargument. - Implement input validation on the server side to ensure that
mock-tokenvalues conform to expected patterns.
Detection coverage 2
Detect Malicious Mock Token Argument
highDetects attempts to exploit CVE-2026-7710 by identifying requests containing the 'mock-token' argument in web server logs.
Detect Mock Token Usage in URI
mediumThis rule detects the usage of 'mock-token' within the URI, potentially indicating an attempt to exploit authentication vulnerabilities.
Detection queries are kept inside the platform. Get full rules →