CVE-2025-13118

A vulnerability was detected in macrozheng mall-swarm and mall up to 1.0.3. Affected by this issue is the function paySuccess of the file /order/paySuccess. The manipulation of the argument orderID results in improper authorization. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/Hwwg/cve/issues/14 Exploit Issue Tracking Third Party Advisory
https://github.com/Hwwg/cve/issues/9 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.332323 Permissions Required VDB Entry
https://vuldb.com/?id.332323 Third Party Advisory VDB Entry
https://vuldb.com/?submit.683345 Third Party Advisory VDB Entry
https://vuldb.com/?submit.686531 Third Party Advisory VDB Entry
https://github.com/Hwwg/cve/issues/9 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:macrozheng:mall:*:*:*:*:*:*:*:*
cpe:2.3:a:macrozheng:mall-swarm:*:*:*:*:*:*:*:*

History

25 Nov 2025, 16:23

Type Values Removed Values Added
CPE cpe:2.3:a:macrozheng:mall:*:*:*:*:*:*:*:*
cpe:2.3:a:macrozheng:mall-swarm:*:*:*:*:*:*:*:*
First Time Macrozheng mall-swarm
Macrozheng
Macrozheng mall
References () https://github.com/Hwwg/cve/issues/14 - () https://github.com/Hwwg/cve/issues/14 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/Hwwg/cve/issues/9 - () https://github.com/Hwwg/cve/issues/9 - Exploit, Issue Tracking, Third Party Advisory
References () https://vuldb.com/?ctiid.332323 - () https://vuldb.com/?ctiid.332323 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.332323 - () https://vuldb.com/?id.332323 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.683345 - () https://vuldb.com/?submit.683345 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.686531 - () https://vuldb.com/?submit.686531 - Third Party Advisory, VDB Entry

15 Nov 2025, 07:15

Type Values Removed Values Added
References
  • () https://github.com/Hwwg/cve/issues/14 -
  • () https://vuldb.com/?submit.686531 -
Summary (en) A vulnerability was detected in macrozheng mall-swarm up to 1.0.3. Affected by this issue is the function paySuccess of the file /order/paySuccess. The manipulation of the argument orderID results in improper authorization. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. (en) A vulnerability was detected in macrozheng mall-swarm and mall up to 1.0.3. Affected by this issue is the function paySuccess of the file /order/paySuccess. The manipulation of the argument orderID results in improper authorization. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

13 Nov 2025, 16:15

Type Values Removed Values Added
References () https://github.com/Hwwg/cve/issues/9 - () https://github.com/Hwwg/cve/issues/9 -

13 Nov 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-13 15:15

Updated : 2025-11-25 16:23


NVD link : CVE-2025-13118

Mitre link : CVE-2025-13118

CVE.ORG link : CVE-2025-13118


JSON object : View

Products Affected

macrozheng

  • mall
  • mall-swarm
CWE
CWE-266

Incorrect Privilege Assignment

CWE-285

Improper Authorization