CVE-2025-13116

A weakness has been identified in macrozheng mall-swarm and mall up to 1.0.3. Affected is the function cancelUserOrder of the file /order/cancelUserOrder. Executing manipulation of the argument orderId can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/Hwwg/cve/issues/13 Exploit Issue Tracking Third Party Advisory
https://github.com/Hwwg/cve/issues/8 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.332321 Permissions Required VDB Entry
https://vuldb.com/?id.332321 Third Party Advisory VDB Entry
https://vuldb.com/?submit.683339 Third Party Advisory VDB Entry
https://vuldb.com/?submit.686530 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:macrozheng:mall:*:*:*:*:*:*:*:*
cpe:2.3:a:macrozheng:mall-swarm:*:*:*:*:*:*:*:*

History

25 Nov 2025, 16:37

Type Values Removed Values Added
References () https://github.com/Hwwg/cve/issues/13 - () https://github.com/Hwwg/cve/issues/13 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/Hwwg/cve/issues/8 - () https://github.com/Hwwg/cve/issues/8 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.332321 - () https://vuldb.com/?ctiid.332321 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.332321 - () https://vuldb.com/?id.332321 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.683339 - () https://vuldb.com/?submit.683339 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.686530 - () https://vuldb.com/?submit.686530 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:macrozheng:mall:*:*:*:*:*:*:*:*
cpe:2.3:a:macrozheng:mall-swarm:*:*:*:*:*:*:*:*
First Time Macrozheng mall-swarm
Macrozheng
Macrozheng mall

15 Nov 2025, 07:15

Type Values Removed Values Added
References
  • () https://github.com/Hwwg/cve/issues/13 -
  • () https://vuldb.com/?submit.686530 -
Summary (en) A weakness has been identified in macrozheng mall-swarm up to 1.0.3. Affected is the function cancelUserOrder of the file /order/cancelUserOrder. Executing manipulation of the argument orderId can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way. (en) A weakness has been identified in macrozheng mall-swarm and mall up to 1.0.3. Affected is the function cancelUserOrder of the file /order/cancelUserOrder. Executing manipulation of the argument orderId can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

13 Nov 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-13 14:15

Updated : 2025-11-25 16:37


NVD link : CVE-2025-13116

Mitre link : CVE-2025-13116

CVE.ORG link : CVE-2025-13116


JSON object : View

Products Affected

macrozheng

  • mall
  • mall-swarm
CWE
CWE-266

Incorrect Privilege Assignment

CWE-285

Improper Authorization