In Yonyou YonBIP v3 and before, the LoginWithV8 interface in the series data application service system is vulnerable to path traversal, allowing unauthorized access to sensitive information within the system
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/iSee857/YonYouBip-path-travel |
|
History
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Yonyou
Yonyou yonbip |
|
| Vendors & Products |
Yonyou
Yonyou yonbip |
Fri, 09 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Yonyou YonBIP v3 and before, the LoginWithV8 interface in the series data application service system is vulnerable to path traversal, allowing unauthorized access to sensitive information within the system | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-12T16:24:18.143Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-66744
No data.
Status : Received
Published: 2026-01-09T17:15:52.927
Modified: 2026-01-09T17:15:52.927
Link: CVE-2025-66744
No data.
OpenCVE Enrichment
Updated: 2026-01-12T14:38:19Z
Weaknesses
No weakness.