YOSHOP 2.0 allows unauthenticated information disclosure via comment-list API endpoints in the Goods module. The Comment model eagerly loads the related User model without field filtering; because User.php defines no $hidden or $visible attributes, sensitive fields (bcrypt password hash, mobile number, pay_money, expend_money.) are exposed in JSON responses. Route names vary per deployment (e.g. /api/goods.pinglun/list), but all call the same vulnerable model logic.
References
Link | Resource |
---|---|
https://gitee.com/xany/yoshop2.0 | Product |
https://github.com/ZyWAC/CVE-Disclosures/blob/6b337a44934ffe948275995e9b79158e97c78fc4/2025/YOSHOP2.0/CVE-2025-56161.md | Exploit Third Party Advisory |
Configurations
History
07 Oct 2025, 17:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://gitee.com/xany/yoshop2.0 - Product | |
References | () https://github.com/ZyWAC/CVE-Disclosures/blob/6b337a44934ffe948275995e9b79158e97c78fc4/2025/YOSHOP2.0/CVE-2025-56161.md - Exploit, Third Party Advisory | |
First Time |
Xany yoshop2.0
Xany |
|
CPE | cpe:2.3:a:xany:yoshop2.0:-:*:*:*:*:*:*:* |
02 Oct 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CWE | CWE-200 |
02 Oct 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-02 16:15
Updated : 2025-10-07 17:55
NVD link : CVE-2025-56161
Mitre link : CVE-2025-56161
CVE.ORG link : CVE-2025-56161
JSON object : View
Products Affected
xany
- yoshop2.0
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor