<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>YunaiV — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/yunaiv/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 00:16:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/yunaiv/feed.xml" rel="self" type="application/rss+xml"/><item><title>YunaiV yudao-cloud Authentication Bypass Vulnerability (CVE-2026-7710)</title><link>https://feed.craftedsignal.io/briefs/2026-05-yunai-auth-bypass/</link><pubDate>Mon, 04 May 2026 00:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-yunai-auth-bypass/</guid><description>YunaiV yudao-cloud up to version 3.8.0 is vulnerable to an authentication bypass (CVE-2026-7710) due to improper handling of the mock-token argument in the JwtAuthenticationTokenFilter.java file, allowing remote attackers to bypass authentication.</description><content:encoded><![CDATA[<p>CVE-2026-7710 is an authentication bypass vulnerability affecting YunaiV&rsquo;s yudao-cloud, specifically versions up to 3.8.0. The vulnerability resides in the <code>doFilterInternal</code> function within the <code>JwtAuthenticationTokenFilter.java</code> file of the Ruoyi-Vue-Pro component. An attacker can exploit this vulnerability by manipulating the <code>mock-token</code> argument, leading to improper authentication. This allows a remote attacker to potentially gain unauthorized access to the application. Public exploits are available, increasing the risk of exploitation. The vendor was notified but has not responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a YunaiV yudao-cloud instance running a vulnerable version (&lt;= 3.8.0).</li>
<li>Attacker crafts a malicious HTTP request targeting an endpoint protected by authentication.</li>
<li>The crafted request includes a manipulated <code>mock-token</code> argument designed to bypass the JWT authentication filter.</li>
<li>The <code>JwtAuthenticationTokenFilter.java</code> component processes the request and improperly validates the manipulated <code>mock-token</code>.</li>
<li>Due to the flawed authentication logic, the attacker is granted unauthorized access as an authenticated user.</li>
<li>Attacker gains access to protected resources and functionalities within the application.</li>
<li>Attacker performs privileged actions such as data modification, account takeover, or further exploitation of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7710 allows attackers to bypass authentication and gain unauthorized access to YunaiV yudao-cloud applications. This can lead to the compromise of sensitive data, modification of application settings, and potentially full system takeover. Given the availability of public exploits, organizations using affected versions of yudao-cloud are at high risk. The CVSS v3.1 base score for this vulnerability is 7.3, indicating a high severity level.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade YunaiV yudao-cloud to a patched version that addresses CVE-2026-7710.</li>
<li>Deploy the Sigma rule <code>Detect Malicious Mock Token Argument</code> to identify exploitation attempts by monitoring web server logs for the presence of a <code>mock-token</code> argument.</li>
<li>Implement input validation on the server side to ensure that <code>mock-token</code> values conform to expected patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication bypass</category><category>cve-2026-7710</category><category>web application</category></item></channel></rss>