YOSHOP 2.0 allows unauthenticated information disclosure via comment-list API endpoints in the Goods module. The Comment model eagerly loads the related User model without field filtering; because User.php defines no $hidden or $visible attributes, sensitive fields (bcrypt password hash, mobile number, pay_money, expend_money.) are exposed in JSON responses. Route names vary per deployment (e.g. /api/goods.pinglun/list), but all call the same vulnerable model logic.
References
| Link | Resource |
|---|---|
| https://gitee.com/xany/yoshop2.0 | Product |
| https://github.com/ZyWAC/CVE-Disclosures/blob/6b337a44934ffe948275995e9b79158e97c78fc4/2025/YOSHOP2.0/CVE-2025-56161.md | Exploit Third Party Advisory |
Configurations
History
30 Oct 2025, 18:33
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:yiovo:firefly_mall:*:*:*:*:open_source:*:*:* | |
| First Time |
Yiovo firefly Mall
Yiovo |
Information
Published : 2025-10-02 16:15
Updated : 2025-10-30 18:33
NVD link : CVE-2025-56161
Mitre link : CVE-2025-56161
CVE.ORG link : CVE-2025-56161
JSON object : View
Products Affected
yiovo
- firefly_mall
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
